Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-44487 (GCVE-0-2023-44487)
Vulnerability from cvelistv5 – Published: 2023-10-10 00:00 – Updated: 2025-11-04 21:08- n/a
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2023-10-10
Due date: 2023-10-31
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Used in ransomware: Unknown
Notes: This vulnerability affects a common open-source component, third-party library, or protocol used by different products. For more information, please see: HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487 | CISA: https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487; https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/; https://nvd.nist.gov/vuln/detail/CVE-2023-44487
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "http",
"vendor": "ietf",
"versions": [
{
"status": "affected",
"version": "2.0"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-44487",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-23T20:34:21.334116Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2023-10-10",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:05:35.187Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487"
}
],
"timeline": [
{
"lang": "en",
"time": "2023-10-10T00:00:00+00:00",
"value": "CVE-2023-44487 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T21:08:27.383Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73"
},
{
"tags": [
"x_transferred"
],
"url": "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/"
},
{
"tags": [
"x_transferred"
],
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/"
},
{
"tags": [
"x_transferred"
],
"url": "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"tags": [
"x_transferred"
],
"url": "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/"
},
{
"tags": [
"x_transferred"
],
"url": "https://news.ycombinator.com/item?id=37831062"
},
{
"tags": [
"x_transferred"
],
"url": "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/envoyproxy/envoy/pull/30055"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/haproxy/haproxy/issues/2312"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/eclipse/jetty.project/issues/10679"
},
{
"tags": [
"x_transferred"
],
"url": "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/nghttp2/nghttp2/pull/1961"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/alibaba/tengine/issues/1872"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2"
},
{
"tags": [
"x_transferred"
],
"url": "https://news.ycombinator.com/item?id=37830987"
},
{
"tags": [
"x_transferred"
],
"url": "https://news.ycombinator.com/item?id=37830998"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/caddyserver/caddy/issues/5877"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/bcdannyboy/CVE-2023-44487"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/grpc/grpc-go/pull/6703"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0"
},
{
"tags": [
"x_transferred"
],
"url": "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://my.f5.com/manage/s/article/K000137106"
},
{
"tags": [
"x_transferred"
],
"url": "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.proxmox.com/show_bug.cgi?id=4988"
},
{
"tags": [
"x_transferred"
],
"url": "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9"
},
{
"tags": [
"x_transferred"
],
"url": "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/microsoft/CBL-Mariner/pull/6381"
},
{
"tags": [
"x_transferred"
],
"url": "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/facebook/proxygen/pull/466"
},
{
"tags": [
"x_transferred"
],
"url": "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/micrictor/http2-rst-stream"
},
{
"tags": [
"x_transferred"
],
"url": "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve"
},
{
"tags": [
"x_transferred"
],
"url": "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/h2o/h2o/pull/3291"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/nodejs/node/pull/50121"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/golang/go/issues/63417"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/advisories/GHSA-vx74-f528-fxqg"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/apache/trafficserver/pull/10564"
},
{
"tags": [
"x_transferred"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487"
},
{
"tags": [
"x_transferred"
],
"url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.openwall.com/lists/oss-security/2023/10/10/6"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/opensearch-project/data-prepper/issues/3474"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/kubernetes/kubernetes/pull/121120"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/oqtane/oqtane.framework/discussions/3367"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p"
},
{
"tags": [
"x_transferred"
],
"url": "https://netty.io/news/2023/10/10/4-1-100-Final.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/"
},
{
"tags": [
"x_transferred"
],
"url": "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack"
},
{
"tags": [
"x_transferred"
],
"url": "https://news.ycombinator.com/item?id=37837043"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/kazu-yamamoto/http2/issues/93"
},
{
"tags": [
"x_transferred"
],
"url": "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113"
},
{
"name": "DSA-5522",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5522"
},
{
"name": "DSA-5521",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5521"
},
{
"tags": [
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/cve-2023-44487"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ninenines/cowboy/issues/1615"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/varnishcache/varnish-cache/issues/3996"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/tempesta-tech/tempesta/issues/1986"
},
{
"tags": [
"x_transferred"
],
"url": "https://blog.vespa.ai/cve-2023-44487/"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/etcd-io/etcd/issues/16740"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event"
},
{
"tags": [
"x_transferred"
],
"url": "https://istio.io/latest/news/security/istio-security-2023-004/"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/junkurihara/rust-rpxy/issues/97"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1216123"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"tags": [
"x_transferred"
],
"url": "https://ubuntu.com/security/CVE-2023-44487"
},
{
"tags": [
"x_transferred"
],
"url": "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/advisories/GHSA-qppj-fm5r-hxr3"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/apache/httpd-site/pull/10"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/projectcontour/contour/pull/5826"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/line/armeria/pull/5232"
},
{
"tags": [
"x_transferred"
],
"url": "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.paloaltonetworks.com/CVE-2023-44487"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/akka/akka-http/issues/4323"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/openresty/openresty/issues/930"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/apache/apisix/issues/10320"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/Azure/AKS/issues/3947"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/Kong/kong/discussions/11741"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/caddyserver/caddy/releases/tag/v2.7.5"
},
{
"name": "[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"
},
{
"name": "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/13/4"
},
{
"name": "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/13/9"
},
{
"tags": [
"x_transferred"
],
"url": "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html"
},
{
"name": "FEDORA-2023-ed2642fd58",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/"
},
{
"tags": [
"x_transferred"
],
"url": "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/"
},
{
"name": "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20231016-0001/"
},
{
"name": "[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html"
},
{
"name": "[oss-security] 20231018 Vulnerability in Jenkins",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/18/4"
},
{
"name": "[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/18/8"
},
{
"name": "[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/19/6"
},
{
"name": "FEDORA-2023-54fadada12",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/"
},
{
"name": "FEDORA-2023-5ff7bf1dd8",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/"
},
{
"name": "[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/20/8"
},
{
"name": "FEDORA-2023-17efd3f2cd",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/"
},
{
"name": "FEDORA-2023-d5030c983c",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/"
},
{
"name": "FEDORA-2023-0259c3f26f",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/"
},
{
"name": "FEDORA-2023-2a9214af5f",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/"
},
{
"name": "FEDORA-2023-e9c04d81c1",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/"
},
{
"name": "FEDORA-2023-f66fc0f62a",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/"
},
{
"name": "FEDORA-2023-4d2fd884ea",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/"
},
{
"name": "FEDORA-2023-b2c50535cb",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/"
},
{
"name": "FEDORA-2023-fe53e13b5b",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"
},
{
"name": "FEDORA-2023-4bf641255e",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"
},
{
"name": "[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html"
},
{
"name": "DSA-5540",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5540"
},
{
"name": "[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715"
},
{
"name": "FEDORA-2023-1caffb88af",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/"
},
{
"name": "FEDORA-2023-3f70b8d406",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/"
},
{
"name": "FEDORA-2023-7b52921cae",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/"
},
{
"name": "FEDORA-2023-7934802344",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/"
},
{
"name": "FEDORA-2023-dbe64661af",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/"
},
{
"name": "FEDORA-2023-822aab0a5a",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"
},
{
"name": "[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html"
},
{
"name": "DSA-5549",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5549"
},
{
"name": "FEDORA-2023-c0c6a91330",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/"
},
{
"name": "FEDORA-2023-492b7be466",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/"
},
{
"name": "DSA-5558",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5558"
},
{
"name": "[debian-lts-announce] 20231119 [SECURITY] [DLA 3656-1] netty security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html"
},
{
"name": "GLSA-202311-09",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"name": "DSA-5570",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5570"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240426-0007/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240621-0007/"
},
{
"url": "https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/08/13/6"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-07T20:05:34.376Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73"
},
{
"url": "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/"
},
{
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/"
},
{
"url": "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack"
},
{
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"url": "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/"
},
{
"url": "https://news.ycombinator.com/item?id=37831062"
},
{
"url": "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/"
},
{
"url": "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack"
},
{
"url": "https://github.com/envoyproxy/envoy/pull/30055"
},
{
"url": "https://github.com/haproxy/haproxy/issues/2312"
},
{
"url": "https://github.com/eclipse/jetty.project/issues/10679"
},
{
"url": "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764"
},
{
"url": "https://github.com/nghttp2/nghttp2/pull/1961"
},
{
"url": "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61"
},
{
"url": "https://github.com/alibaba/tengine/issues/1872"
},
{
"url": "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2"
},
{
"url": "https://news.ycombinator.com/item?id=37830987"
},
{
"url": "https://news.ycombinator.com/item?id=37830998"
},
{
"url": "https://github.com/caddyserver/caddy/issues/5877"
},
{
"url": "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/"
},
{
"url": "https://github.com/bcdannyboy/CVE-2023-44487"
},
{
"url": "https://github.com/grpc/grpc-go/pull/6703"
},
{
"url": "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244"
},
{
"url": "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0"
},
{
"url": "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html"
},
{
"url": "https://my.f5.com/manage/s/article/K000137106"
},
{
"url": "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/"
},
{
"url": "https://bugzilla.proxmox.com/show_bug.cgi?id=4988"
},
{
"url": "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9"
},
{
"name": "[oss-security] 20231010 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/10/7"
},
{
"name": "[oss-security] 20231010 CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/10/6"
},
{
"url": "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected"
},
{
"url": "https://github.com/microsoft/CBL-Mariner/pull/6381"
},
{
"url": "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo"
},
{
"url": "https://github.com/facebook/proxygen/pull/466"
},
{
"url": "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088"
},
{
"url": "https://github.com/micrictor/http2-rst-stream"
},
{
"url": "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve"
},
{
"url": "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/"
},
{
"url": "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf"
},
{
"url": "https://github.com/h2o/h2o/pull/3291"
},
{
"url": "https://github.com/nodejs/node/pull/50121"
},
{
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"url": "https://github.com/golang/go/issues/63417"
},
{
"url": "https://github.com/advisories/GHSA-vx74-f528-fxqg"
},
{
"url": "https://github.com/apache/trafficserver/pull/10564"
},
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487"
},
{
"url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14"
},
{
"url": "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q"
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/10/10/6"
},
{
"url": "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487"
},
{
"url": "https://github.com/opensearch-project/data-prepper/issues/3474"
},
{
"url": "https://github.com/kubernetes/kubernetes/pull/121120"
},
{
"url": "https://github.com/oqtane/oqtane.framework/discussions/3367"
},
{
"url": "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p"
},
{
"url": "https://netty.io/news/2023/10/10/4-1-100-Final.html"
},
{
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"url": "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/"
},
{
"url": "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack"
},
{
"url": "https://news.ycombinator.com/item?id=37837043"
},
{
"url": "https://github.com/kazu-yamamoto/http2/issues/93"
},
{
"url": "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html"
},
{
"url": "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1"
},
{
"url": "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113"
},
{
"name": "DSA-5522",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5522"
},
{
"name": "DSA-5521",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5521"
},
{
"url": "https://access.redhat.com/security/cve/cve-2023-44487"
},
{
"url": "https://github.com/ninenines/cowboy/issues/1615"
},
{
"url": "https://github.com/varnishcache/varnish-cache/issues/3996"
},
{
"url": "https://github.com/tempesta-tech/tempesta/issues/1986"
},
{
"url": "https://blog.vespa.ai/cve-2023-44487/"
},
{
"url": "https://github.com/etcd-io/etcd/issues/16740"
},
{
"url": "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event"
},
{
"url": "https://istio.io/latest/news/security/istio-security-2023-004/"
},
{
"url": "https://github.com/junkurihara/rust-rpxy/issues/97"
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1216123"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"url": "https://ubuntu.com/security/CVE-2023-44487"
},
{
"url": "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125"
},
{
"url": "https://github.com/advisories/GHSA-qppj-fm5r-hxr3"
},
{
"url": "https://github.com/apache/httpd-site/pull/10"
},
{
"url": "https://github.com/projectcontour/contour/pull/5826"
},
{
"url": "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632"
},
{
"url": "https://github.com/line/armeria/pull/5232"
},
{
"url": "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/"
},
{
"url": "https://security.paloaltonetworks.com/CVE-2023-44487"
},
{
"url": "https://github.com/akka/akka-http/issues/4323"
},
{
"url": "https://github.com/openresty/openresty/issues/930"
},
{
"url": "https://github.com/apache/apisix/issues/10320"
},
{
"url": "https://github.com/Azure/AKS/issues/3947"
},
{
"url": "https://github.com/Kong/kong/discussions/11741"
},
{
"url": "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487"
},
{
"url": "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/"
},
{
"url": "https://github.com/caddyserver/caddy/releases/tag/v2.7.5"
},
{
"name": "[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"
},
{
"name": "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/13/4"
},
{
"name": "[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/13/9"
},
{
"url": "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/"
},
{
"url": "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html"
},
{
"name": "FEDORA-2023-ed2642fd58",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/"
},
{
"url": "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/"
},
{
"name": "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231016-0001/"
},
{
"name": "[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html"
},
{
"name": "[oss-security] 20231018 Vulnerability in Jenkins",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/18/4"
},
{
"name": "[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/18/8"
},
{
"name": "[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/19/6"
},
{
"name": "FEDORA-2023-54fadada12",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/"
},
{
"name": "FEDORA-2023-5ff7bf1dd8",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/"
},
{
"name": "[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/20/8"
},
{
"name": "FEDORA-2023-17efd3f2cd",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/"
},
{
"name": "FEDORA-2023-d5030c983c",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/"
},
{
"name": "FEDORA-2023-0259c3f26f",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/"
},
{
"name": "FEDORA-2023-2a9214af5f",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/"
},
{
"name": "FEDORA-2023-e9c04d81c1",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/"
},
{
"name": "FEDORA-2023-f66fc0f62a",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/"
},
{
"name": "FEDORA-2023-4d2fd884ea",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/"
},
{
"name": "FEDORA-2023-b2c50535cb",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/"
},
{
"name": "FEDORA-2023-fe53e13b5b",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"
},
{
"name": "FEDORA-2023-4bf641255e",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"
},
{
"name": "[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html"
},
{
"name": "DSA-5540",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5540"
},
{
"name": "[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html"
},
{
"url": "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715"
},
{
"name": "FEDORA-2023-1caffb88af",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/"
},
{
"name": "FEDORA-2023-3f70b8d406",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/"
},
{
"name": "FEDORA-2023-7b52921cae",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/"
},
{
"name": "FEDORA-2023-7934802344",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/"
},
{
"name": "FEDORA-2023-dbe64661af",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/"
},
{
"name": "FEDORA-2023-822aab0a5a",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"
},
{
"name": "[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html"
},
{
"name": "DSA-5549",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5549"
},
{
"name": "FEDORA-2023-c0c6a91330",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/"
},
{
"name": "FEDORA-2023-492b7be466",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/"
},
{
"name": "DSA-5558",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5558"
},
{
"name": "[debian-lts-announce] 20231119 [SECURITY] [DLA 3656-1] netty security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html"
},
{
"name": "GLSA-202311-09",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"name": "DSA-5570",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5570"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0007/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240621-0007/"
},
{
"url": "https://github.com/grpc/grpc/releases/tag/v1.59.2"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-44487",
"datePublished": "2023-10-10T00:00:00.000Z",
"dateReserved": "2023-09-29T00:00:00.000Z",
"dateUpdated": "2025-11-04T21:08:27.383Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2023-44487",
"cwes": "[\"CWE-400\"]",
"dateAdded": "2023-10-10",
"dueDate": "2023-10-31",
"knownRansomwareCampaignUse": "Unknown",
"notes": "This vulnerability affects a common open-source component, third-party library, or protocol used by different products. For more information, please see: HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487 | CISA: https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487; https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/; https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"product": "HTTP/2",
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "HTTP/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS).",
"vendorProject": "IETF",
"vulnerabilityName": "HTTP/2 Rapid Reset Attack Vulnerability"
},
"fkie_nvd": {
"cisaActionDue": "2023-10-31",
"cisaExploitAdd": "2023-10-10",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "HTTP/2 Rapid Reset Attack Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5200E35-222B-42E0-83E0-5B702684D992\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.57.0\", \"matchCriteriaId\": \"C3BDC297-F023-4E87-8518-B84CCF9DD6A8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.1.100\", \"matchCriteriaId\": \"D12D5257-7ED2-400F-9EF7-40E0D3650C2B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:envoyproxy:envoy:1.24.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B058776-B5B7-4079-B0AF-23F40926DCEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:envoyproxy:envoy:1.25.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D565975-EFD9-467C-B6E3-1866A4EF17A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:envoyproxy:envoy:1.26.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D487271-1B5E-4F16-B0CB-A7B8908935C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:envoyproxy:envoy:1.27.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA6ED627-EFB3-4BDD-8ECC-C5947A1470B2\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.4.53\", \"matchCriteriaId\": \"A4A6F189-6C43-462D-85C9-B0EBDA8A4683\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.0.0\", \"versionEndExcluding\": \"10.0.17\", \"matchCriteriaId\": \"C993C920-85C0-4181-A95E-5D965A670738\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0.0\", \"versionEndExcluding\": \"11.0.17\", \"matchCriteriaId\": \"08E79A8E-E12C-498F-AF4F-1AAA7135661E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.0.0\", \"versionEndExcluding\": \"12.0.2\", \"matchCriteriaId\": \"F138D800-9A3B-4C76-8A3C-4793083A1517\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.7.5\", \"matchCriteriaId\": \"6341DDDA-AD27-4087-9D59-0A212F0037B4\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.20.10\", \"matchCriteriaId\": \"328120E4-C031-44B4-9BE5-03B0CDAA066F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.21.0\", \"versionEndExcluding\": \"1.21.3\", \"matchCriteriaId\": \"5FD9AB15-E5F6-4DBC-9EC7-D0ABA705802A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*\", \"versionEndExcluding\": \"0.17.0\", \"matchCriteriaId\": \"D7D2F801-6F65-4705-BCB9-D057EA54A707\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*\", \"versionEndExcluding\": \"0.17.0\", \"matchCriteriaId\": \"801F25DA-F38C-4452-8E90-235A3B1A5FF0\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"D93F04AD-DF14-48AB-9F13-8B2E491CF42E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"7522C760-7E07-406F-BF50-5656D5723C4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"3A7F605E-EB10-40FB-98D6-7E3A95E310BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"783E62F2-F867-48F1-B123-D1227C970674\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A8D90B7-A1AF-4EFB-B688-1563D81E5C6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"6603ED6A-3366-4572-AFCD-B3D4B1EC7606\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"88978E38-81D3-4EFE-8525-A300B101FA69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"0510296F-92D7-4388-AE3A-0D9799C2FC4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"D7698D6C-B1F7-43C1-BBA6-88E956356B3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A1CC91B-6920-4AF0-9EDD-DD3189E78F4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"05E452AA-A520-4CBE-8767-147772B69194\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"596FC5D5-7329-4E39-841E-CAE937C02219\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"B3C7A168-F370-441E-8790-73014BCEC39F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"CF16FD01-7704-40AB-ACB2-80A883804D22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1769D69A-CB59-46B1-89B3-FB97DC6DEB9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"9167FEC1-2C37-4946-9657-B4E69301FB24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"7B4B3442-E0C0-48CD-87AD-060E15C9801E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"8FA85EC1-D91A-49DD-949B-2AF7AC813CA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"20662BB0-4C3D-4CF0-B068-3555C65DD06C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59203EBF-C52A-45A1-B8DF-00E17E3EFB51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"7EC2324D-EC8B-41DF-88A7-819E53AAD0FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"9B88F9D1-B54B-40C7-A18A-26C4A071D7EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"C8F39403-C259-4D6F-9E9A-53671017EEDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"220F2D38-FA82-45EF-B957-7678C9FEDBC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C698C1C-A3DD-46E2-B05A-12F2604E7F85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"922AA845-530A-4B4B-9976-4CBC30C8A324\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"F938EB43-8373-47EB-B269-C6DF058A9244\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"1771493E-ACAA-477F-8AB4-25DB12F6AD6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"5E86F3D5-65A4-48CE-A6A2-736BBB88E3F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87670A74-34FE-45DF-A725-25B804C845B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"C7E422F6-C4C2-43AC-B137-0997B5739030\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"CC3F710F-DBCB-4976-9719-CF063DA22377\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"4B9B76A1-7C5A-453F-A4ED-F1A81BCEBEB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"88EDFCD9-775C-48FA-9CDA-2B04DA8D0612\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67DB21AE-DF53-442D-B492-C4ED9A20B105\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"4C9FCBCB-9CE0-49E7-85C8-69E71D211912\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"112DFA85-90AD-478D-BD70-8C7C0C074F1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"DB704A1C-D8B7-48BB-A15A-C14DB591FE4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"21D51D9F-2840-4DEA-A007-D20111A1745C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BC1D037-74D2-4F92-89AD-C90F6CBF440B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"CAEF3EA4-7D5A-4B44-9CE3-258AEC745866\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"2FBCE2D1-9D93-415D-AB2C-2060307C305A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"8070B469-8CC4-4D2F-97D7-12D0ABB963C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"A326597E-725D-45DE-BEF7-2ED92137B253\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B235A78-649B-46C5-B24B-AB485A884654\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"08B25AAB-A98C-4F89-9131-29E3A8C0ED23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"98D2CE1E-DED0-470A-AA78-C78EF769C38E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"C966FABA-7199-4F0D-AB8C-4590FE9D2FFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84D00768-E71B-4FF7-A7BF-F2C8CFBC900D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"BC36311E-BB00-4750-85C8-51F5A2604F07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"A65D357E-4B40-42EC-9AAA-2B6CEF78C401\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"D7EF9865-FE65-4DFB-BF21-62FBCE65FF1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABBD10E8-6054-408F-9687-B9BF6375CA09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"E6018B01-048C-43BB-A78D-66910ED60CA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"3A6A5686-5A8B-45D5-9165-BC99D2CCAC47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"5D2A121F-5BD2-4263-8ED3-1DDE25B5C306\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"0A4F7BAD-3EDD-4DE0-AAB7-DE5ACA34DD79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83794B04-87E2-4CA9-81F5-BB820D0F5395\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"D9EC2237-117F-43BD-ADEC-516CF72E04EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"F70D4B6F-65CF-48F4-9A07-072DFBCE53D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"29563719-1AF2-4BB8-8CCA-A0869F87795D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"D24815DD-579A-46D1-B9F2-3BB2C56BC54D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A6E7035-3299-474F-8F67-945EA9A059D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"0360F76D-E75E-4B05-A294-B47012323ED9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"7A4607BF-41AC-4E84-A110-74E085FF0445\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"441CC945-7CA3-49C0-AE10-94725301E31D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"46BA8E8A-6ED5-4FB2-8BBC-586AA031085A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56FB92F7-FF1E-425D-A5AB-9D9FB0BB9450\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"969C4F14-F6D6-46D6-B348-FC1463877680\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.5.0\", \"versionEndIncluding\": \"1.8.2\", \"matchCriteriaId\": \"41AD5040-1250-45F5-AB63-63F333D49BCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"8257AA59-C14D-4EC1-B22C-DFBB92CBC297\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"37DB32BB-F4BA-4FB5-94B1-55C3F06749CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"FFF5007E-761C-4697-8D34-C064DF0ABE8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"910441D3-90EF-4375-B007-D51120A60AB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"667EB77B-DA13-4BA4-9371-EE3F3A109F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"8A6F9699-A485-4614-8F38-5A556D31617E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"5A90F547-97A2-41EC-9FDF-25F869F0FA38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"E76E1B82-F1DC-4366-B388-DBDF16C586A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"660137F4-15A1-42D1-BBAC-99A1D5BB398B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C446827A-1F71-4FAD-9422-580642D26AD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"1932D32D-0E4B-4BBD-816F-6D47AB2E2F04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"D47B7691-A95B-45C0-BAB4-27E047F3C379\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"2CD1637D-0E42-4928-867A-BA0FDB6E8462\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"3A599F90-F66B-4DF0-AD7D-D234F328BD59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D1B2000-C3FE-4B4C-885A-A5076EB164E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.1.0\", \"versionEndIncluding\": \"13.1.5\", \"matchCriteriaId\": \"5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.0\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"57D92D05-C67D-437E-88F3-DCC3F6B0ED2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.0\", \"versionEndIncluding\": \"15.1.10\", \"matchCriteriaId\": \"ECCB8C30-861E-4E48-A5F5-30EE523C1FB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.0\", \"versionEndIncluding\": \"16.1.4\", \"matchCriteriaId\": \"F5FEAD2A-3A58-432E-BEBB-6E3FDE24395F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AB23AE6-245E-43D6-B832-933F8259F937\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.9.5\", \"versionEndIncluding\": \"1.25.2\", \"matchCriteriaId\": \"1188B4A9-2684-413C-83D1-E91C75AE0FCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.0.0\", \"versionEndIncluding\": \"2.4.2\", \"matchCriteriaId\": \"3337609D-5291-4A52-BC6A-6A8D4E60EB20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.0.0\", \"versionEndIncluding\": \"3.3.0\", \"matchCriteriaId\": \"6CF0ABD9-EB28-4966-8C31-EED7AFBF1527\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"r25\", \"versionEndExcluding\": \"r29\", \"matchCriteriaId\": \"F291CB34-47A4-425A-A200-087CC295AEC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"5892B558-EC3A-43FF-A1D5-B2D9F70796F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"96BF2B19-52C7-4051-BA58-CAE6F912B72F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.5.0\", \"versionEndIncluding\": \"8.5.93\", \"matchCriteriaId\": \"ABD26B48-CC80-4FAE-BD3D-78DE4C80C92B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.0.0\", \"versionEndIncluding\": \"9.0.80\", \"matchCriteriaId\": \"F3EC20B6-B2AB-41F5-9BF9-D16C1FE67C34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.1.0\", \"versionEndIncluding\": \"10.1.13\", \"matchCriteriaId\": \"0765CC3D-AB1A-4147-8900-EF4C105321F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1AA7FF6-E8E7-4BF6-983E-0A99B0183008\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*\", \"matchCriteriaId\": \"57088BDD-A136-45EF-A8A1-2EBF79CEC2CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*\", \"matchCriteriaId\": \"B32D1D7A-A04F-444E-8F45-BB9A9E4B0199\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AAD52CE-94F5-4F98-A027-9A7E68818CB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1F981F5-035A-4EDD-8A9F-481EE8BC7FF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*\", \"matchCriteriaId\": \"03A171AF-2EC8-4422-912C-547CDB58CAAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*\", \"matchCriteriaId\": \"538E68C4-0BA4-495F-AEF8-4EF6EE7963CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*\", \"matchCriteriaId\": \"49350A6E-5E1D-45B2-A874-3B8601B3ADCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F50942F-DF54-46C0-8371-9A476DD3EEA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*\", \"matchCriteriaId\": \"D12C2C95-B79F-4AA4-8CE3-99A3EE7991AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*\", \"matchCriteriaId\": \"98792138-DD56-42DF-9612-3BDC65EEC117\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:swiftnio_http\\\\/2:*:*:*:*:*:swift:*:*\", \"versionEndExcluding\": \"1.28.0\", \"matchCriteriaId\": \"08190072-3880-4EF5-B642-BA053090D95B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*\", \"versionEndExcluding\": \"1.56.3\", \"matchCriteriaId\": \"5F4CDEA9-CB47-4881-B096-DA896E2364F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*\", \"versionEndIncluding\": \"1.59.2\", \"matchCriteriaId\": \"E65AF7BC-7DAE-408A-8485-FBED22815F75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*\", \"versionStartIncluding\": \"1.58.0\", \"versionEndExcluding\": \"1.58.3\", \"matchCriteriaId\": \"DD868DDF-C889-4F36-B5E6-68B6D9EA48CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:grpc:grpc:1.57.0:-:*:*:*:go:*:*\", \"matchCriteriaId\": \"FBD991E2-DB5A-4AAD-95BA-4B5ACB811C96\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.0.0\", \"versionEndExcluding\": \"6.0.23\", \"matchCriteriaId\": \"4496821E-BD55-4F31-AD9C-A3D66CBBD6BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"7.0.0\", \"versionEndExcluding\": \"7.0.12\", \"matchCriteriaId\": \"8DF7ECF6-178D-433C-AA21-BAE9EF248F37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.0.0\", \"versionEndExcluding\": \"6.0.23\", \"matchCriteriaId\": \"1C3418F4-B8BF-4666-BB39-C188AB01F45C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"7.0.0\", \"versionEndExcluding\": \"7.0.12\", \"matchCriteriaId\": \"1278DD1C-EFA9-4316-AD32-24C1B1FB0CEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2023-10-08\", \"matchCriteriaId\": \"3BDFB0FF-0F4A-4B7B-94E8-ED72A8106314\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.0\", \"versionEndExcluding\": \"17.2.20\", \"matchCriteriaId\": \"16A8F269-E07E-402F-BFD5-60F3988A5EAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.4\", \"versionEndExcluding\": \"17.4.12\", \"matchCriteriaId\": \"C4B2B972-69E2-4D21-9A7C-B2AFF1D89EB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.6\", \"versionEndExcluding\": \"17.6.8\", \"matchCriteriaId\": \"DA5834D4-F52F-41C0-AA11-C974FFEEA063\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.7\", \"versionEndExcluding\": \"17.7.5\", \"matchCriteriaId\": \"2166106F-ACD6-4C7B-B0CC-977B83CC5F73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*\", \"versionEndExcluding\": \"10.0.14393.6351\", \"matchCriteriaId\": \"4CD49C41-6D90-47D3-AB4F-4A74169D3A8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*\", \"versionEndExcluding\": \"10.0.14393.6351\", \"matchCriteriaId\": \"BAEFEE13-9CD7-46A2-8AF6-0A33C79C05F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.17763.4974\", \"matchCriteriaId\": \"E500D59C-6597-45E9-A57B-BE26C0C231D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.19044.3570\", \"matchCriteriaId\": \"C9F9A643-90C6-489C-98A0-D2739CE72F86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.19045.3570\", \"matchCriteriaId\": \"1814619C-ED07-49E0-A50A-E28D824D43BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.22000.2538\", \"matchCriteriaId\": \"100A27D3-87B0-4E72-83F6-7605E3F35E63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.22621.2428\", \"matchCriteriaId\": \"C6A36795-0238-45C9-ABE6-3DCCF751915B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB79EE26-FC32-417D-A49C-A1A63165A968\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"821614DD-37DD-44E2-A8A4-FE8D23A33C3C\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\", \"versionStartIncluding\": \"18.0.0\", \"versionEndExcluding\": \"18.18.2\", \"matchCriteriaId\": \"C61F0294-5C7E-4DB2-8905-B85D0782F35F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"20.0.0\", \"versionEndExcluding\": \"20.8.1\", \"matchCriteriaId\": \"69843DE4-4721-4F0A-A9B7-0F6DF5AAA388\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2023-10-11\", \"matchCriteriaId\": \"B25279EF-C406-4133-99ED-0492703E0A4E\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2023-10-10\", \"matchCriteriaId\": \"9FFFF84B-F35C-43DE-959A-A5D10C3AE9F5\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2023.10.16.00\", \"matchCriteriaId\": \"9DCE8C89-7C22-48CA-AF22-B34C8AA2CB8C\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.6.1\", \"matchCriteriaId\": \"EDEB508E-0EBD-4450-9074-983DDF568AB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.0.0\", \"versionEndExcluding\": \"8.1.9\", \"matchCriteriaId\": \"93A1A748-6C71-4191-8A16-A93E94E2CDE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.0.0\", \"versionEndExcluding\": \"9.2.3\", \"matchCriteriaId\": \"4E4BCAF6-B246-41EC-9EE1-24296BFC4F5A\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:amazon:opensearch_data_prepper:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.5.0\", \"matchCriteriaId\": \"6F70360D-6214-46BA-AF82-6AB01E13E4E9\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46D69DCC-AE4D-4EA5-861C-D60951444C6C\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:kazu-yamamoto:http2:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.2.2\", \"matchCriteriaId\": \"E2DA759E-1AF8-49D3-A3FC-1B426C13CA82\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.17.6\", \"matchCriteriaId\": \"28BE6F7B-AE66-4C8A-AAFA-F1262671E9BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.18.0\", \"versionEndExcluding\": \"1.18.3\", \"matchCriteriaId\": \"F0C8E760-C8D2-483A-BBD4-6A6D292A3874\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.19.0\", \"versionEndExcluding\": \"1.19.1\", \"matchCriteriaId\": \"5D0F78BB-6A05-4C97-A8DB-E731B6CC8CC7\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2023-10-10\", \"matchCriteriaId\": \"050AE218-3871-44D6-94DA-12D84C2093CB\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.10.5\", \"matchCriteriaId\": \"B36BFFB0-C0EC-4926-A1DB-0B711C846A68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"376EAF9B-E994-4268-9704-0A45EA30270F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3D08335-C291-4623-B80C-3B14C4D1FA32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"21033CEE-CEF5-4B0D-A565-4A6FC764AA6D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:*\", \"versionEndExcluding\": \"2023-10-11\", \"matchCriteriaId\": \"FC4C66B1-42C0-495D-AE63-2889DE0BED84\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linkerd:linkerd:*:*:*:*:stable:kubernetes:*:*\", \"versionStartIncluding\": \"2.12.0\", \"versionEndIncluding\": \"2.12.5\", \"matchCriteriaId\": \"8633E263-F066-4DD8-A734-90207207A873\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linkerd:linkerd:2.13.0:*:*:*:stable:kubernetes:*:*\", \"matchCriteriaId\": \"34A23BD9-A0F4-4D85-8011-EAC93C29B4E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linkerd:linkerd:2.13.1:*:*:*:stable:kubernetes:*:*\", \"matchCriteriaId\": \"27ED3533-A795-422F-B923-68BE071DC00D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linkerd:linkerd:2.14.0:*:*:*:stable:kubernetes:*:*\", \"matchCriteriaId\": \"45F7E352-3208-4188-A5B1-906E00DF9896\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linkerd:linkerd:2.14.1:*:*:*:stable:kubernetes:*:*\", \"matchCriteriaId\": \"DF89A8AD-66FE-439A-B732-CAAB304D765B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.26.0\", \"matchCriteriaId\": \"A400C637-AF18-4BEE-B57C-145261B65DEC\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"653A5B08-0D02-4362-A8B1-D00B24C6C6F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B0E6B4B-BAA6-474E-A18C-72C9719CEC1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0FD736A-8730-446A-BA3A-7B608DB62B0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4C504B6-3902-46E2-82B7-48AEC9CDD48D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B4BE2D6-43C3-4065-A213-5DB1325DC78F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D54F5AE-61EC-4434-9D5F-9394A3979894\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE29B9D6-63DC-4779-ACE8-4E51E6A0AF37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E37E1B3-6F68-4502-85D6-68333643BDFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D5A7736-A403-4617-8790-18E46CB74DA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33F13B03-69BF-4A8B-A0A0-7F47FD857461\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9393119E-F018-463F-9548-60436F104195\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC45EE1E-2365-42D4-9D55-92FA24E5ED3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E567CD9F-5A43-4D25-B911-B5D0440698F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68146098-58F8-417E-B165-5182527117C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB4D6790-63E5-4043-B8BE-B489D649061D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78698F40-0777-4990-822D-02E1B5D0E2C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B87C8AD3-8878-4546-86C2-BF411876648C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF03BDE8-602D-4DEE-BA5B-5B20FDF47741\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A58966CB-36AF-4E64-AB39-BE3A0753E155\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"585BC540-073B-425B-B664-5EA4C00AFED6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B453CF7-9AA6-4B94-A003-BF7AE0B82F53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD354E32-A8B0-484C-B4C6-9FBCD3430D2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B142ACCC-F7A9-4A3B-BE60-0D6691D5058D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72A54BDA-311C-413B-8E4D-388AD65A170A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A305F012-544E-4245-9D69-1C8CD37748B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B40CCE4F-EA2C-453D-BB76-6388767E5C6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF93A27E-AA2B-4C2E-9B8D-FE7267847326\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B12A3A8-6456-481A-A0C9-524543FCC149\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C2E7E3C-A507-4AB2-97E5-4944D8775CF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E22EBF9-AA0D-4712-9D69-DD97679CE835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"941B114C-FBD7-42FF-B1D8-4EA30E99102C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"339CFB34-A795-49F9-BF6D-A00F3A1A4F63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D044DBE-6F5A-4C53-828E-7B1A570CACFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E23FA47F-B967-44AD-AB76-1BB2CAD3CA5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*\", \"matchCriteriaId\": \"65203CA1-5225-4E55-A187-6454C091F532\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BF8EFFB-5686-4F28-A68F-1A8854E098CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"932D137F-528B-4526-9A89-CD59FA1AB0FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DA9B2E2-958B-478D-87D6-E5CDDCD44315\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3F5FF1E-5DA3-4EC3-B41A-A362BDFC4C69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99B8A88B-0B31-4CFF-AFD7-C9D3DDD5790D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97321212-0E07-4CC2-A917-7B5F61AB9A5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF390236-3259-4C8F-891C-62ACC4386CD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0AAA300-691A-4957-8B69-F6888CC971B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45937289-2D64-47CB-A750-5B4F0D4664A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B129311C-EB4B-4041-B85C-44D5E53FCAA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1AB54DB-3FB4-41CB-88ED-1400FD22AB85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77675CB7-67D7-44E9-B7FF-D224B3341AA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A76A2BCE-4AAE-46D7-93D6-2EDE0FC83145\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C877879-B84B-471C-80CF-0656521CA8AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCC81071-B46D-4F5D-AC25-B4A4CCC20C73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B3000D2-35DF-4A93-9FC0-1AD3AB8349B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E315FC5C-FF19-43C9-A58A-CF2A5FF13824\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20A6B40D-F991-4712-8E30-5FE008505CB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1987BDA-0113-4603-B9BE-76647EB043F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D482A3D2-6E9B-42BA-9926-35E5BDD5F3BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"848C92A9-0677-442B-8D52-A448F2019903\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F564701-EDC1-43CF-BB9F-287D6992C6CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12B0CF2B-D1E1-4E20-846E-6F0D873499A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EFEC7CA-8DDA-48A6-A7B6-1F1D14792890\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8885C2C-7FB8-40CA-BCB9-B48C50BF2499\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D88B140-D2A1-4A0A-A2E9-1A3B50C295AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4CFF558-3C47-480D-A2F0-BABF26042943\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:service_telemetry_framework:1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A903C3AD-2D25-45B5-BF4A-A5BEB2286627\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC5EBD2A-32A3-46D5-B155-B44DCB7F6902\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:akka:http_server:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.5.3\", \"matchCriteriaId\": \"C2792650-851F-4820-B003-06A4BEA092D7\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:konghq:kong_gateway:*:*:*:*:enterprise:*:*:*\", \"versionEndExcluding\": \"3.4.2\", \"matchCriteriaId\": \"9F6B63B9-F4C9-4A3F-9310-E0918E1070D1\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*\", \"versionEndIncluding\": \"2.414.2\", \"matchCriteriaId\": \"E6FF5F80-A991-43D4-B49F-D843E2BC5798\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*\", \"versionEndIncluding\": \"2.427\", \"matchCriteriaId\": \"54D25DA9-12D0-4F14-83E6-C69D0293AAB9\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.4.0\", \"matchCriteriaId\": \"8E1AFFB9-C717-4727-B0C9-5A0C281710E2\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.21.4.3\", \"matchCriteriaId\": \"25C85001-E0AB-4B01-8EE7-1D9C77CD956E\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"11.1\", \"matchCriteriaId\": \"F98F9D27-6659-413F-8F29-4FDB0882AAC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.1.3\", \"matchCriteriaId\": \"C98BF315-C563-47C2-BAD1-63347A3D1008\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"705CBA49-21C9-4400-B7B9-71CDF9F97D8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.0\", \"matchCriteriaId\": \"AA2BE0F1-DD16-4876-8EBA-F187BD38B159\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"796B6C58-2140-4105-A2A1-69865A194A75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEA99DC6-EA03-469F-A8BE-7F96FDF0B333\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"x14.3.3\", \"matchCriteriaId\": \"6560DBF4-AFE6-4672-95DE-74A0B8F4170A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"7.4.2\", \"matchCriteriaId\": \"84785919-796D-41E5-B652-6B5765C81D4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.11.0\", \"matchCriteriaId\": \"92A74A1A-C69F-41E6-86D0-D6BB1C5D0A1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.3.3\", \"matchCriteriaId\": \"6FE7BA33-2AC0-4A85-97AD-6D77F20BA2AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"7.2.1\", \"matchCriteriaId\": \"4FE2F959-1084-48D1-B1F1-8182FC9862DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.10.4\", \"matchCriteriaId\": \"5CC17E6B-D7AB-40D7-AEC5-F5B555AC4D7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"11.2\", \"matchCriteriaId\": \"1BB6B48E-EA36-40A0-96D0-AF909BEC1147\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.2.0\", \"matchCriteriaId\": \"2CBED844-7F94-498C-836D-8593381A9657\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.19.2\", \"matchCriteriaId\": \"C170DBA1-0899-4ECC-9A0D-8FEB1DA1B510\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"x14.3.3\", \"matchCriteriaId\": \"358FA1DC-63D3-49F6-AC07-9E277DD0D9DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2024.01.0\", \"matchCriteriaId\": \"BFF2D182-7599-4B81-B56B-F44EDA1384C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4868BCCA-24DE-4F24-A8AF-B3A545C0396E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2024.02.0\", \"matchCriteriaId\": \"194F7A1F-FD43-4FF7-9AE2-C13AA5567E8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2024.02.0\", \"matchCriteriaId\": \"BEC75F99-C7F0-47EB-9032-C9D3A42EBA20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6638F4E-16F7-447D-B755-52640BCB1C61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC34F742-530E-4AB4-8AFC-D1E088E256B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D31CC0E9-8E21-436B-AB84-EA1B1BC60DCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.6.2\", \"matchCriteriaId\": \"E22AD683-345B-4E16-BB9E-E9B1783E09AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5C0D694-9E24-4782-B35F-D7C3E3B0F2ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.22\", \"matchCriteriaId\": \"2955BEE9-F567-4006-B96D-92E10FF84DB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"17.15.1\", \"matchCriteriaId\": \"67502878-DB20-4410-ABA0-A1C5705064CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"7.11.2\", \"matchCriteriaId\": \"177DED2D-8089-4494-BDD9-7F84FC06CD5B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:secure_web_appliance_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.1.0\", \"matchCriteriaId\": \"54A29FD3-4128-4333-8445-A7DD04A6ECF6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67074526-9933-46B3-9FE3-A0BE73C5E8A7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.2\\\\(7\\\\)\", \"matchCriteriaId\": \"EEB32D2E-AD9D-44A0-AEF7-689F7D2605C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.3\\\\(1\\\\)\", \"versionEndExcluding\": \"10.3\\\\(5\\\\)\", \"matchCriteriaId\": \"0A236A0A-6956-4D79-B8E5-B2D0C79FAE88\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"528ED62B-D739-4E06-AC64-B506FD73BBAB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC2A6C31-438A-4CF5-A3F3-364B1672EB7D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76C10D85-88AC-4A79-8866-BED88A0F8DF8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09AC2BAD-F536-48D0-A2F0-D4E290519EB6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECC4FFCC-E886-49BC-9737-5B5BA2AAB14B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F4E8EE4-031D-47D3-A12E-EE5F792172EE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41C14CC9-C244-4B86-AEA6-C50BAD5DA9A6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8FF2EC4-0C09-4C00-9956-A2A4A894F63D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D14D4B4E-120E-4607-A4F1-447C7BF3052E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15702ACB-29F3-412D-8805-E107E0729E35\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E930332-CDDD-48D5-93BC-C22D693BBFA2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29B34855-D8D2-4114-80D2-A4D159C62458\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BF4B8FE-E134-4491-B5C2-C1CFEB64731B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4226DA0-9371-401C-8247-E6E636A116C3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7664666F-BCE4-4799-AEEA-3A73E6AD33F4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3DBBFE9-835C-4411-8492-6006E74BAC65\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3293438-3D18-45A2-B093-2C3F65783336\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C97C29EE-9426-4BBE-8D84-AB5FF748703D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3132q-x\\\\/3132q-xl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E142C18F-9FB5-4D96-866A-141D7D16CAF7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F43B770-D96C-44EA-BC12-9F39FC4317B9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7817F4E6-B2DA-4F06-95A4-AF329F594C02\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CED628B5-97A8-4B26-AA40-BEC854982157\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BB9DD73-E31D-4921-A6D6-E14E04703588\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3172pq\\\\/pq-xl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EFC116A-627F-4E05-B631-651D161217C8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4532F513-0543-4960-9877-01F23CA7BA1B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B43502B-FD53-465A-B60F-6A359C6ACD99\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3229124-B097-4AAC-8ACD-2F9C89DCC3AB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32A532C0-B0E3-484A-B356-88970E7D0248\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C84D24C-2256-42AF-898A-221EBE9FE1E4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"652A2849-668D-4156-88FB-C19844A59F33\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D008CA1C-6F5A-40EA-BB12-A9D84D5AF700\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24FBE87B-8A4F-43A8-98A3-4A7D9C630937\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6ACD09AC-8B28-4ACB-967B-AB3D450BC137\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43913A0E-50D5-47DD-94D8-DD3391633619\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D397349-CCC6-479B-9273-FB1FFF4F34F2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC7286A7-780F-4A45-940A-4AD5C9D0F201\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA52D5C1-13D8-4D23-B022-954CCEF491F1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F7AF8D7-431B-43CE-840F-CC0817D159C0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAC204C8-1A5A-4E85-824E-DC9B8F6A802D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8E1073F-D374-4311-8F12-AD8C72FAA293\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAF5AF71-15DF-4151-A1CF-E138A7103FC8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10F80A72-AD54-4699-B8AE-82715F0B58E2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3524-x\\\\/xl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E505C0B1-2119-4C6A-BF96-C282C633D169\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9354B6A2-D7D6-442E-BF4C-FE8A336D9E94\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"088C0323-683A-44F5-8D42-FF6EC85D080E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74CB4002-7636-4382-B33E-FBA060A13C34\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3548-x\\\\/xl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"915EF8F6-6039-4DD0-B875-30D911752B74\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10CEBF73-3EE0-459A-86C5-F8F6243FE27C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97217080-455C-48E4-8CE1-6D5B9485864F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95D2C4C3-65CE-4612-A027-AF70CEFC3233\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57572E4A-78D5-4D1A-938B-F05F01759612\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.2\\\\(7\\\\)\", \"matchCriteriaId\": \"EEB32D2E-AD9D-44A0-AEF7-689F7D2605C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.3\\\\(1\\\\)\", \"versionEndExcluding\": \"10.3\\\\(5\\\\)\", \"matchCriteriaId\": \"0A236A0A-6956-4D79-B8E5-B2D0C79FAE88\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CD9C1F1-8582-4F67-A77D-97CBFECB88B8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"532CE4B0-A3C9-4613-AAAF-727817D06FB4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9200yc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24CA1A59-2681-4507-AC74-53BD481099B9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4283E433-7F8C-4410-B565-471415445811\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_92160yc_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF9147C9-5D8B-40F5-9AAA-66A3495A0AD8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFB9FDE8-8533-4F65-BF32-4066D042B2F7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F80AB6FB-32FD-43D7-A9F1-80FA47696210\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_92300yc_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AA5389A-8AD1-476E-983A-54DF573C30F5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5B2E4C1-2627-4B9D-8E92-4B483F647651\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_92304qc_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1B1A8F1-45B1-4E64-A254-7191FA93CB6D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83DA8BFA-D7A2-476C-A6F5-CAE610033BC2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"557ED31C-C26A-4FAE-8B14-D06B49F7F08B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11411BFD-3F4D-4309-AB35-A3629A360FB0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9236c_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB2FFD26-8255-4351-8594-29D2AEFC06EF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E663DE91-C86D-48DC-B771-FA72A8DF7A7C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9272q_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61E10975-B47E-4F4D-8096-AEC7B7733612\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92E2CB2B-DA11-4CF7-9D57-3D4D48990DC0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A90184B3-C82F-4CE5-B2AD-97D5E4690871\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40E40F42-632A-47DF-BE33-DC25B826310B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93108tc-ex_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C67B7A6-9BB2-41FC-8FA3-8D0DF67CBC68\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C47F6BF9-2ADB-41A4-8D7D-8BB00141BB23\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16C64136-89C2-443C-AF7B-BED81D3DE25A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBEF7F26-BB47-44BD-872E-130820557C23\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07DE6F63-2C7D-415B-8C34-01EC05C062F3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93120tx_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"182000E0-8204-4D8B-B7DE-B191AFE12E28\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F309E7B9-B828-4CD2-9D2B-8966EE5B9CC1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F423E45D-A6DD-4305-9C6A-EAB26293E53A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93128tx_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDC208BC-7E19-48C6-A20E-A79A51B7362C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"102F91CD-DFB6-43D4-AE5B-DA157A696230\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E952A96A-0F48-4357-B7DD-1127D8827650\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93180lc-ex_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"084D0191-563B-4FF0-B589-F35DA118E1C6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7DB6FC5-762A-4F16-AE8C-69330EFCF640\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F70D81F1-8B12-4474-9060-B4934D8A3873\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5394DE31-3863-4CA9-B7B1-E5227183100D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93180yc-ex_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"968390BC-B430-4903-B614-13104BFAE635\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7349D69B-D8FA-4462-AA28-69DD18A652D9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE4BB834-2C00-4384-A78E-AF3BCDDC58AF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0D30D52-837F-4FDA-B8E5-A9066E9C6D2F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6678B8A-D905-447E-BE7E-6BFB4CC5DAFE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CE49B45-F2E9-491D-9C29-1B46E9CE14E2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93240tc-fx2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BFAD21E-59EE-4CCE-8F1E-621D2EA50905\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91231DC6-2773-4238-8C14-A346F213B5E5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DF88547-BAF4-47B0-9F60-80A30297FCEB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02C3CE6D-BD54-48B1-A188-8E53DA001424\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"498991F7-39D6-428C-8C7D-DD8DC72A0346\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"113772B6-E9D2-4094-9468-3F4E1A87D07D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9332pq_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7B90D36-5124-4669-8462-4EAF35B0F53D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C45A38D6-BED6-4FEF-AD87-A1E813695DE0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1FC2B1F-232E-4754-8076-CC82F3648730\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CDD27C9-5EAF-4956-8AB7-740C84C9D4FC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F1127D2-12C0-454F-91EF-5EE334070D06\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9336pq_aci:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D6EB963-E0F2-4A02-8765-AB2064BE19E9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"785FD17C-F32E-4042-9DDE-A89B3AAE0334\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9336pq_aci_spine_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEAAF99B-5406-4722-81FB-A91CBAC2DF41\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73DC1E93-561E-490C-AE0E-B02BAB9A7C8E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12DA2DE5-8ADA-4D6A-BC1A-9C06FA163B1C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CF467E2-4567-426E-8F48-39669E0F514C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63842B25-8C32-4988-BBBD-61E9CB09B4F3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68EA1FEF-B6B6-49FE-A0A4-5387F76303F8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40D6DB7F-C025-4971-9615-73393ED61078\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4364ADB9-8162-451D-806A-B98924E6B2CF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B53BCB42-ED61-4FCF-8068-CB467631C63C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9372px-e_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"737C724A-B6CD-4FF7-96E0-EBBF645D660E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9372px_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7067AEC7-DFC8-4437-9338-C5165D9A8F36\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49E0371B-FDE2-473C-AA59-47E1269D050F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"489D11EC-5A18-4F32-BC7C-AC1FCEC27222\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9372tx-e_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71D4CF15-B293-4403-A1A9-96AD3933BAEF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9372tx_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBCC1515-2DBE-4DF2-8E83-29A869170F36\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BC5293E-F2B4-46DC-85DA-167EA323FCFD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9396px_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7282AAFF-ED18-4992-AC12-D953C35EC328\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA022E77-6557-4A33-9A3A-D028E2DB669A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9396tx_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"360409CC-4172-4878-A76B-EA1C1F8C7A79\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8D5D5E2-B40B-475D-9EF3-8441016E37E9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9432pq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDA8E1F0-74A6-4725-B6AA-A1112EFC5D0C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63BE0266-1C00-4D6A-AD96-7F82532ABAA7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9500_16-slot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73F59A4B-AE92-4533-8EDC-D1DD850309FF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9500_4-slot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"492A2C86-DD38-466B-9965-77629A73814F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9500_8-slot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FB7AA46-4018-4925-963E-719E1037F759\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31B9D1E4-10B9-4B6F-B848-D93ABF6486D6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9500_supervisor_a\\\\+:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB270C45-756E-400A-979F-D07D750C881A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E8A085C-2DBA-4269-AB01-B16019FBB4DA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9500_supervisor_b\\\\+:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A79DD582-AF68-44F1-B640-766B46EF2BE2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B04484DA-AA59-4833-916E-6A8C96D34F0D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"768BE390-5ED5-48A7-9E80-C4DE8BA979B1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9504_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D07B5399-44C7-468D-9D57-BB5B5E26CE50\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDC2F709-AFBE-48EA-A3A2-DA1134534FB6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9508_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B76FB64F-16F0-4B0B-B304-B46258D434BA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E02DC82-0D26-436F-BA64-73C958932B0A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9516_switch:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E128053-834B-4DD5-A517-D14B4FC2B56F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9536pq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"163743A1-09E7-4EC5-8ECA-79E4B9CE173B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9636pq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE340E4C-DC48-4FC8-921B-EE304DB5AE0A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9716d-gx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C367BBE0-D71F-4CB5-B50E-72B033E73FE1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9736pq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85E1D224-4751-4233-A127-A041068C804A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD31B075-01B1-429E-83F4-B999356A0EB9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A10C9C0A-C96A-4B45-90D0-6ED457EB5F4C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3284D16F-3275-4F8D-8AE4-D413DE19C4FA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.\"}, {\"lang\": \"es\", \"value\": \"El protocolo HTTP/2 permite una denegaci\\u00f3n de servicio (consumo de recursos del servidor) porque la cancelaci\\u00f3n de solicitudes puede restablecer muchas transmisiones r\\u00e1pidamente, como se explot\\u00f3 en la naturaleza entre agosto y octubre de 2023.\"}]",
"id": "CVE-2023-44487",
"lastModified": "2024-12-20T17:40:52.067",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2023-10-10T14:15:10.883",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/13/4\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/13/9\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/18/4\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/18/8\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/19/6\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/20/8\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://access.redhat.com/security/cve/cve-2023-44487\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Technical Description\"]}, {\"url\": \"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack\", \"source\": \"cve@mitre.org\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"https://blog.vespa.ai/cve-2023-44487/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.proxmox.com/show_bug.cgi?id=4988\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2242803\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1216123\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Patch\"]}, {\"url\": \"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Technical Description\"]}, {\"url\": \"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack\", \"source\": \"cve@mitre.org\", \"tags\": [\"Technical Description\"]}, {\"url\": \"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve\", \"source\": \"cve@mitre.org\", \"tags\": [\"Technical Description\", \"Third Party Advisory\"]}, {\"url\": \"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/Azure/AKS/issues/3947\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/Kong/kong/discussions/11741\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/advisories/GHSA-qppj-fm5r-hxr3\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/advisories/GHSA-vx74-f528-fxqg\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/akka/akka-http/issues/4323\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/alibaba/tengine/issues/1872\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/apache/apisix/issues/10320\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/apache/httpd-site/pull/10\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113\", \"source\": \"cve@mitre.org\", \"tags\": [\"Product\"]}, {\"url\": \"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Product\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/apache/trafficserver/pull/10564\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/bcdannyboy/CVE-2023-44487\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/caddyserver/caddy/issues/5877\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/caddyserver/caddy/releases/tag/v2.7.5\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://github.com/dotnet/announcements/issues/277\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Mitigation\"]}, {\"url\": \"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73\", \"source\": \"cve@mitre.org\", \"tags\": [\"Product\", \"Release Notes\"]}, {\"url\": \"https://github.com/eclipse/jetty.project/issues/10679\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/envoyproxy/envoy/pull/30055\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/etcd-io/etcd/issues/16740\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/facebook/proxygen/pull/466\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/golang/go/issues/63417\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/grpc/grpc-go/pull/6703\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/h2o/h2o/pull/3291\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/haproxy/haproxy/issues/2312\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244\", \"source\": \"cve@mitre.org\", \"tags\": [\"Product\"]}, {\"url\": \"https://github.com/junkurihara/rust-rpxy/issues/97\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/kazu-yamamoto/http2/issues/93\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/kubernetes/kubernetes/pull/121120\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/line/armeria/pull/5232\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/micrictor/http2-rst-stream\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/microsoft/CBL-Mariner/pull/6381\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/nghttp2/nghttp2/pull/1961\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://github.com/ninenines/cowboy/issues/1615\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/nodejs/node/pull/50121\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/openresty/openresty/issues/930\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/opensearch-project/data-prepper/issues/3474\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/oqtane/oqtane.framework/discussions/3367\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/projectcontour/contour/pull/5826\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/tempesta-tech/tempesta/issues/1986\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/varnishcache/varnish-cache/issues/3996\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Release Notes\"]}, {\"url\": \"https://istio.io/latest/news/security/istio-security-2023-004/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Patch\"]}, {\"url\": \"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://my.f5.com/manage/s/article/K000137106\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://netty.io/news/2023/10/10/4-1-100-Final.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37830987\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37830998\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37831062\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37837043\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202311-09\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20231016-0001/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240426-0007/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0007/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2023-44487\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://ubuntu.com/security/CVE-2023-44487\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event\", \"source\": \"cve@mitre.org\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5521\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5522\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5540\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5549\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5558\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5570\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mitigation\"]}, {\"url\": \"https://www.openwall.com/lists/oss-security/2023/10/10/6\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack\", \"source\": \"cve@mitre.org\", \"tags\": [\"Press/Media Coverage\"]}, {\"url\": \"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/13/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/13/9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/18/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/18/8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/19/6\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/20/8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://access.redhat.com/security/cve/cve-2023-44487\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Technical Description\", \"Vendor Advisory\"]}, {\"url\": \"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"https://blog.vespa.ai/cve-2023-44487/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.proxmox.com/show_bug.cgi?id=4988\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2242803\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1216123\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Technical Description\", \"Vendor Advisory\"]}, {\"url\": \"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Technical Description\", \"Vendor Advisory\"]}, {\"url\": \"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Technical Description\", \"Third Party Advisory\"]}, {\"url\": \"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/Azure/AKS/issues/3947\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/Kong/kong/discussions/11741\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/advisories/GHSA-qppj-fm5r-hxr3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/advisories/GHSA-vx74-f528-fxqg\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Patch\"]}, {\"url\": \"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/akka/akka-http/issues/4323\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/alibaba/tengine/issues/1872\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/apache/apisix/issues/10320\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/apache/httpd-site/pull/10\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\"]}, {\"url\": \"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\"]}, {\"url\": \"https://github.com/apache/trafficserver/pull/10564\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/bcdannyboy/CVE-2023-44487\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/caddyserver/caddy/issues/5877\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/caddyserver/caddy/releases/tag/v2.7.5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/dotnet/announcements/issues/277\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://github.com/eclipse/jetty.project/issues/10679\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/envoyproxy/envoy/pull/30055\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/etcd-io/etcd/issues/16740\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/facebook/proxygen/pull/466\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/golang/go/issues/63417\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/grpc/grpc-go/pull/6703\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/h2o/h2o/pull/3291\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/haproxy/haproxy/issues/2312\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\"]}, {\"url\": \"https://github.com/junkurihara/rust-rpxy/issues/97\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/kazu-yamamoto/http2/issues/93\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/kubernetes/kubernetes/pull/121120\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/line/armeria/pull/5232\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/micrictor/http2-rst-stream\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/microsoft/CBL-Mariner/pull/6381\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/nghttp2/nghttp2/pull/1961\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://github.com/ninenines/cowboy/issues/1615\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/nodejs/node/pull/50121\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/openresty/openresty/issues/930\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/opensearch-project/data-prepper/issues/3474\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/oqtane/oqtane.framework/discussions/3367\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/projectcontour/contour/pull/5826\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/tempesta-tech/tempesta/issues/1986\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/varnishcache/varnish-cache/issues/3996\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"https://istio.io/latest/news/security/istio-security-2023-004/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://my.f5.com/manage/s/article/K000137106\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://netty.io/news/2023/10/10/4-1-100-Final.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37830987\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37830998\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Press/Media Coverage\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37831062\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37837043\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202311-09\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20231016-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240426-0007/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0007/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2023-44487\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://ubuntu.com/security/CVE-2023-44487\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5521\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5522\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5540\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5549\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5558\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5570\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"https://www.openwall.com/lists/oss-security/2023/10/10/6\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Press/Media Coverage\"]}, {\"url\": \"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-44487\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-10-10T14:15:10.883\",\"lastModified\":\"2025-11-07T19:00:41.810\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.\"},{\"lang\":\"es\",\"value\":\"El protocolo HTTP/2 permite una denegaci\u00f3n de servicio (consumo de recursos del servidor) porque la cancelaci\u00f3n de solicitudes puede restablecer muchas transmisiones r\u00e1pidamente, como se explot\u00f3 en la naturaleza entre agosto y octubre de 2023.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"cisaExploitAdd\":\"2023-10-10\",\"cisaActionDue\":\"2023-10-31\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"HTTP/2 Rapid Reset Attack Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5200E35-222B-42E0-83E0-5B702684D992\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.57.0\",\"matchCriteriaId\":\"C3BDC297-F023-4E87-8518-B84CCF9DD6A8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1.100\",\"matchCriteriaId\":\"D12D5257-7ED2-400F-9EF7-40E0D3650C2B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:envoyproxy:envoy:1.24.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B058776-B5B7-4079-B0AF-23F40926DCEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:envoyproxy:envoy:1.25.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D565975-EFD9-467C-B6E3-1866A4EF17A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:envoyproxy:envoy:1.26.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D487271-1B5E-4F16-B0CB-A7B8908935C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:envoyproxy:envoy:1.27.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA6ED627-EFB3-4BDD-8ECC-C5947A1470B2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.4.53\",\"matchCriteriaId\":\"A4A6F189-6C43-462D-85C9-B0EBDA8A4683\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.0.17\",\"matchCriteriaId\":\"C993C920-85C0-4181-A95E-5D965A670738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndExcluding\":\"11.0.17\",\"matchCriteriaId\":\"08E79A8E-E12C-498F-AF4F-1AAA7135661E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.0.2\",\"matchCriteriaId\":\"F138D800-9A3B-4C76-8A3C-4793083A1517\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.7.5\",\"matchCriteriaId\":\"6341DDDA-AD27-4087-9D59-0A212F0037B4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.20.10\",\"matchCriteriaId\":\"328120E4-C031-44B4-9BE5-03B0CDAA066F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.21.0\",\"versionEndExcluding\":\"1.21.3\",\"matchCriteriaId\":\"5FD9AB15-E5F6-4DBC-9EC7-D0ABA705802A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*\",\"versionEndExcluding\":\"0.17.0\",\"matchCriteriaId\":\"D7D2F801-6F65-4705-BCB9-D057EA54A707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*\",\"versionEndExcluding\":\"0.17.0\",\"matchCriteriaId\":\"801F25DA-F38C-4452-8E90-235A3B1A5FF0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"D93F04AD-DF14-48AB-9F13-8B2E491CF42E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"7522C760-7E07-406F-BF50-5656D5723C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"3A7F605E-EB10-40FB-98D6-7E3A95E310BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"783E62F2-F867-48F1-B123-D1227C970674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8D90B7-A1AF-4EFB-B688-1563D81E5C6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"6603ED6A-3366-4572-AFCD-B3D4B1EC7606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"88978E38-81D3-4EFE-8525-A300B101FA69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"0510296F-92D7-4388-AE3A-0D9799C2FC4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"D7698D6C-B1F7-43C1-BBA6-88E956356B3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1CC91B-6920-4AF0-9EDD-DD3189E78F4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"05E452AA-A520-4CBE-8767-147772B69194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"596FC5D5-7329-4E39-841E-CAE937C02219\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"B3C7A168-F370-441E-8790-73014BCEC39F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"CF16FD01-7704-40AB-ACB2-80A883804D22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1769D69A-CB59-46B1-89B3-FB97DC6DEB9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"9167FEC1-2C37-4946-9657-B4E69301FB24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"7B4B3442-E0C0-48CD-87AD-060E15C9801E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"8FA85EC1-D91A-49DD-949B-2AF7AC813CA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"20662BB0-4C3D-4CF0-B068-3555C65DD06C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59203EBF-C52A-45A1-B8DF-00E17E3EFB51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"7EC2324D-EC8B-41DF-88A7-819E53AAD0FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"9B88F9D1-B54B-40C7-A18A-26C4A071D7EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"C8F39403-C259-4D6F-9E9A-53671017EEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"220F2D38-FA82-45EF-B957-7678C9FEDBC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C698C1C-A3DD-46E2-B05A-12F2604E7F85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"922AA845-530A-4B4B-9976-4CBC30C8A324\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"F938EB43-8373-47EB-B269-C6DF058A9244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"1771493E-ACAA-477F-8AB4-25DB12F6AD6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"5E86F3D5-65A4-48CE-A6A2-736BBB88E3F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87670A74-34FE-45DF-A725-25B804C845B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"C7E422F6-C4C2-43AC-B137-0997B5739030\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"CC3F710F-DBCB-4976-9719-CF063DA22377\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"4B9B76A1-7C5A-453F-A4ED-F1A81BCEBEB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"88EDFCD9-775C-48FA-9CDA-2B04DA8D0612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67DB21AE-DF53-442D-B492-C4ED9A20B105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"4C9FCBCB-9CE0-49E7-85C8-69E71D211912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"112DFA85-90AD-478D-BD70-8C7C0C074F1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"DB704A1C-D8B7-48BB-A15A-C14DB591FE4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"21D51D9F-2840-4DEA-A007-D20111A1745C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC1D037-74D2-4F92-89AD-C90F6CBF440B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"CAEF3EA4-7D5A-4B44-9CE3-258AEC745866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"2FBCE2D1-9D93-415D-AB2C-2060307C305A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"8070B469-8CC4-4D2F-97D7-12D0ABB963C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"A326597E-725D-45DE-BEF7-2ED92137B253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B235A78-649B-46C5-B24B-AB485A884654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"08B25AAB-A98C-4F89-9131-29E3A8C0ED23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"98D2CE1E-DED0-470A-AA78-C78EF769C38E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"C966FABA-7199-4F0D-AB8C-4590FE9D2FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84D00768-E71B-4FF7-A7BF-F2C8CFBC900D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"BC36311E-BB00-4750-85C8-51F5A2604F07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"A65D357E-4B40-42EC-9AAA-2B6CEF78C401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"D7EF9865-FE65-4DFB-BF21-62FBCE65FF1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABBD10E8-6054-408F-9687-B9BF6375CA09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"E6018B01-048C-43BB-A78D-66910ED60CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"3A6A5686-5A8B-45D5-9165-BC99D2CCAC47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"5D2A121F-5BD2-4263-8ED3-1DDE25B5C306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"0A4F7BAD-3EDD-4DE0-AAB7-DE5ACA34DD79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83794B04-87E2-4CA9-81F5-BB820D0F5395\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"D9EC2237-117F-43BD-ADEC-516CF72E04EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"F70D4B6F-65CF-48F4-9A07-072DFBCE53D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"29563719-1AF2-4BB8-8CCA-A0869F87795D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"D24815DD-579A-46D1-B9F2-3BB2C56BC54D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A6E7035-3299-474F-8F67-945EA9A059D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"0360F76D-E75E-4B05-A294-B47012323ED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"7A4607BF-41AC-4E84-A110-74E085FF0445\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"441CC945-7CA3-49C0-AE10-94725301E31D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"46BA8E8A-6ED5-4FB2-8BBC-586AA031085A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56FB92F7-FF1E-425D-A5AB-9D9FB0BB9450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"969C4F14-F6D6-46D6-B348-FC1463877680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.5.0\",\"versionEndIncluding\":\"1.8.2\",\"matchCriteriaId\":\"41AD5040-1250-45F5-AB63-63F333D49BCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"8257AA59-C14D-4EC1-B22C-DFBB92CBC297\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"37DB32BB-F4BA-4FB5-94B1-55C3F06749CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"FFF5007E-761C-4697-8D34-C064DF0ABE8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"910441D3-90EF-4375-B007-D51120A60AB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"667EB77B-DA13-4BA4-9371-EE3F3A109F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"8A6F9699-A485-4614-8F38-5A556D31617E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"5A90F547-97A2-41EC-9FDF-25F869F0FA38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"E76E1B82-F1DC-4366-B388-DBDF16C586A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"660137F4-15A1-42D1-BBAC-99A1D5BB398B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C446827A-1F71-4FAD-9422-580642D26AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"1932D32D-0E4B-4BBD-816F-6D47AB2E2F04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"D47B7691-A95B-45C0-BAB4-27E047F3C379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"2CD1637D-0E42-4928-867A-BA0FDB6E8462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"3A599F90-F66B-4DF0-AD7D-D234F328BD59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D1B2000-C3FE-4B4C-885A-A5076EB164E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"57D92D05-C67D-437E-88F3-DCC3F6B0ED2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndIncluding\":\"15.1.10\",\"matchCriteriaId\":\"ECCB8C30-861E-4E48-A5F5-30EE523C1FB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndIncluding\":\"16.1.4\",\"matchCriteriaId\":\"F5FEAD2A-3A58-432E-BEBB-6E3FDE24395F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB23AE6-245E-43D6-B832-933F8259F937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.9.5\",\"versionEndIncluding\":\"1.25.2\",\"matchCriteriaId\":\"1188B4A9-2684-413C-83D1-E91C75AE0FCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndIncluding\":\"2.4.2\",\"matchCriteriaId\":\"3337609D-5291-4A52-BC6A-6A8D4E60EB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndIncluding\":\"3.3.0\",\"matchCriteriaId\":\"6CF0ABD9-EB28-4966-8C31-EED7AFBF1527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"r25\",\"versionEndExcluding\":\"r29\",\"matchCriteriaId\":\"F291CB34-47A4-425A-A200-087CC295AEC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5892B558-EC3A-43FF-A1D5-B2D9F70796F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"96BF2B19-52C7-4051-BA58-CAE6F912B72F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.5.0\",\"versionEndIncluding\":\"8.5.93\",\"matchCriteriaId\":\"ABD26B48-CC80-4FAE-BD3D-78DE4C80C92B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0\",\"versionEndIncluding\":\"9.0.80\",\"matchCriteriaId\":\"F3EC20B6-B2AB-41F5-9BF9-D16C1FE67C34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.1.0\",\"versionEndIncluding\":\"10.1.13\",\"matchCriteriaId\":\"0765CC3D-AB1A-4147-8900-EF4C105321F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1AA7FF6-E8E7-4BF6-983E-0A99B0183008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*\",\"matchCriteriaId\":\"57088BDD-A136-45EF-A8A1-2EBF79CEC2CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*\",\"matchCriteriaId\":\"B32D1D7A-A04F-444E-8F45-BB9A9E4B0199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AAD52CE-94F5-4F98-A027-9A7E68818CB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F981F5-035A-4EDD-8A9F-481EE8BC7FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*\",\"matchCriteriaId\":\"03A171AF-2EC8-4422-912C-547CDB58CAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*\",\"matchCriteriaId\":\"538E68C4-0BA4-495F-AEF8-4EF6EE7963CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*\",\"matchCriteriaId\":\"49350A6E-5E1D-45B2-A874-3B8601B3ADCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F50942F-DF54-46C0-8371-9A476DD3EEA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12C2C95-B79F-4AA4-8CE3-99A3EE7991AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*\",\"matchCriteriaId\":\"98792138-DD56-42DF-9612-3BDC65EEC117\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:swiftnio_http\\\\/2:*:*:*:*:*:swift:*:*\",\"versionEndExcluding\":\"1.28.0\",\"matchCriteriaId\":\"08190072-3880-4EF5-B642-BA053090D95B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*\",\"versionEndExcluding\":\"1.56.3\",\"matchCriteriaId\":\"5F4CDEA9-CB47-4881-B096-DA896E2364F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*\",\"versionEndIncluding\":\"1.59.2\",\"matchCriteriaId\":\"E65AF7BC-7DAE-408A-8485-FBED22815F75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*\",\"versionStartIncluding\":\"1.58.0\",\"versionEndExcluding\":\"1.58.3\",\"matchCriteriaId\":\"DD868DDF-C889-4F36-B5E6-68B6D9EA48CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:grpc:grpc:1.57.0:-:*:*:*:go:*:*\",\"matchCriteriaId\":\"FBD991E2-DB5A-4AAD-95BA-4B5ACB811C96\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndExcluding\":\"6.0.23\",\"matchCriteriaId\":\"4496821E-BD55-4F31-AD9C-A3D66CBBD6BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.0.12\",\"matchCriteriaId\":\"8DF7ECF6-178D-433C-AA21-BAE9EF248F37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndExcluding\":\"6.0.23\",\"matchCriteriaId\":\"1C3418F4-B8BF-4666-BB39-C188AB01F45C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.0.12\",\"matchCriteriaId\":\"1278DD1C-EFA9-4316-AD32-24C1B1FB0CEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2023-10-08\",\"matchCriteriaId\":\"3BDFB0FF-0F4A-4B7B-94E8-ED72A8106314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.0\",\"versionEndExcluding\":\"17.2.20\",\"matchCriteriaId\":\"16A8F269-E07E-402F-BFD5-60F3988A5EAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.4\",\"versionEndExcluding\":\"17.4.12\",\"matchCriteriaId\":\"C4B2B972-69E2-4D21-9A7C-B2AFF1D89EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.6\",\"versionEndExcluding\":\"17.6.8\",\"matchCriteriaId\":\"DA5834D4-F52F-41C0-AA11-C974FFEEA063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.7\",\"versionEndExcluding\":\"17.7.5\",\"matchCriteriaId\":\"2166106F-ACD6-4C7B-B0CC-977B83CC5F73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.14393.6351\",\"matchCriteriaId\":\"4CD49C41-6D90-47D3-AB4F-4A74169D3A8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"10.0.14393.6351\",\"matchCriteriaId\":\"BAEFEE13-9CD7-46A2-8AF6-0A33C79C05F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.17763.4974\",\"matchCriteriaId\":\"E500D59C-6597-45E9-A57B-BE26C0C231D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.19044.3570\",\"matchCriteriaId\":\"C9F9A643-90C6-489C-98A0-D2739CE72F86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.19045.3570\",\"matchCriteriaId\":\"1814619C-ED07-49E0-A50A-E28D824D43BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.22000.2538\",\"matchCriteriaId\":\"100A27D3-87B0-4E72-83F6-7605E3F35E63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.22621.2428\",\"matchCriteriaId\":\"C6A36795-0238-45C9-ABE6-3DCCF751915B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB79EE26-FC32-417D-A49C-A1A63165A968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821614DD-37DD-44E2-A8A4-FE8D23A33C3C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"18.0.0\",\"versionEndExcluding\":\"18.18.2\",\"matchCriteriaId\":\"94BAB9EB-1527-4D9A-BADE-0708579536CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"20.0.0\",\"versionEndExcluding\":\"20.8.1\",\"matchCriteriaId\":\"69843DE4-4721-4F0A-A9B7-0F6DF5AAA388\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2023-10-11\",\"matchCriteriaId\":\"B25279EF-C406-4133-99ED-0492703E0A4E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2023-10-10\",\"matchCriteriaId\":\"9FFFF84B-F35C-43DE-959A-A5D10C3AE9F5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2023.10.16.00\",\"matchCriteriaId\":\"9DCE8C89-7C22-48CA-AF22-B34C8AA2CB8C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.6.1\",\"matchCriteriaId\":\"EDEB508E-0EBD-4450-9074-983DDF568AB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndExcluding\":\"8.1.9\",\"matchCriteriaId\":\"93A1A748-6C71-4191-8A16-A93E94E2CDE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0\",\"versionEndExcluding\":\"9.2.3\",\"matchCriteriaId\":\"4E4BCAF6-B246-41EC-9EE1-24296BFC4F5A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amazon:opensearch_data_prepper:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.5.0\",\"matchCriteriaId\":\"6F70360D-6214-46BA-AF82-6AB01E13E4E9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46D69DCC-AE4D-4EA5-861C-D60951444C6C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kazu-yamamoto:http2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.2.2\",\"matchCriteriaId\":\"E2DA759E-1AF8-49D3-A3FC-1B426C13CA82\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.17.6\",\"matchCriteriaId\":\"28BE6F7B-AE66-4C8A-AAFA-F1262671E9BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.18.0\",\"versionEndExcluding\":\"1.18.3\",\"matchCriteriaId\":\"F0C8E760-C8D2-483A-BBD4-6A6D292A3874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.19.0\",\"versionEndExcluding\":\"1.19.1\",\"matchCriteriaId\":\"5D0F78BB-6A05-4C97-A8DB-E731B6CC8CC7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2023-10-10\",\"matchCriteriaId\":\"050AE218-3871-44D6-94DA-12D84C2093CB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.10.5\",\"matchCriteriaId\":\"B36BFFB0-C0EC-4926-A1DB-0B711C846A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"376EAF9B-E994-4268-9704-0A45EA30270F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D08335-C291-4623-B80C-3B14C4D1FA32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"21033CEE-CEF5-4B0D-A565-4A6FC764AA6D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:*\",\"versionEndExcluding\":\"2023-10-11\",\"matchCriteriaId\":\"FC4C66B1-42C0-495D-AE63-2889DE0BED84\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linkerd:linkerd:*:*:*:*:stable:kubernetes:*:*\",\"versionStartIncluding\":\"2.12.0\",\"versionEndIncluding\":\"2.12.5\",\"matchCriteriaId\":\"8633E263-F066-4DD8-A734-90207207A873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linkerd:linkerd:2.13.0:*:*:*:stable:kubernetes:*:*\",\"matchCriteriaId\":\"34A23BD9-A0F4-4D85-8011-EAC93C29B4E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linkerd:linkerd:2.13.1:*:*:*:stable:kubernetes:*:*\",\"matchCriteriaId\":\"27ED3533-A795-422F-B923-68BE071DC00D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linkerd:linkerd:2.14.0:*:*:*:stable:kubernetes:*:*\",\"matchCriteriaId\":\"45F7E352-3208-4188-A5B1-906E00DF9896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linkerd:linkerd:2.14.1:*:*:*:stable:kubernetes:*:*\",\"matchCriteriaId\":\"DF89A8AD-66FE-439A-B732-CAAB304D765B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.26.0\",\"matchCriteriaId\":\"A400C637-AF18-4BEE-B57C-145261B65DEC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"653A5B08-0D02-4362-A8B1-D00B24C6C6F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B0E6B4B-BAA6-474E-A18C-72C9719CEC1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0FD736A-8730-446A-BA3A-7B608DB62B0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4C504B6-3902-46E2-82B7-48AEC9CDD48D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B4BE2D6-43C3-4065-A213-5DB1325DC78F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D54F5AE-61EC-4434-9D5F-9394A3979894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE29B9D6-63DC-4779-ACE8-4E51E6A0AF37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E37E1B3-6F68-4502-85D6-68333643BDFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D5A7736-A403-4617-8790-18E46CB74DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F13B03-69BF-4A8B-A0A0-7F47FD857461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9393119E-F018-463F-9548-60436F104195\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC45EE1E-2365-42D4-9D55-92FA24E5ED3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E567CD9F-5A43-4D25-B911-B5D0440698F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68146098-58F8-417E-B165-5182527117C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB4D6790-63E5-4043-B8BE-B489D649061D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78698F40-0777-4990-822D-02E1B5D0E2C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B87C8AD3-8878-4546-86C2-BF411876648C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF03BDE8-602D-4DEE-BA5B-5B20FDF47741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A58966CB-36AF-4E64-AB39-BE3A0753E155\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BC540-073B-425B-B664-5EA4C00AFED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B453CF7-9AA6-4B94-A003-BF7AE0B82F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD354E32-A8B0-484C-B4C6-9FBCD3430D2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B142ACCC-F7A9-4A3B-BE60-0D6691D5058D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72A54BDA-311C-413B-8E4D-388AD65A170A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A305F012-544E-4245-9D69-1C8CD37748B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B40CCE4F-EA2C-453D-BB76-6388767E5C6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF93A27E-AA2B-4C2E-9B8D-FE7267847326\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B12A3A8-6456-481A-A0C9-524543FCC149\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C2E7E3C-A507-4AB2-97E5-4944D8775CF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E22EBF9-AA0D-4712-9D69-DD97679CE835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"941B114C-FBD7-42FF-B1D8-4EA30E99102C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"339CFB34-A795-49F9-BF6D-A00F3A1A4F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D044DBE-6F5A-4C53-828E-7B1A570CACFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23FA47F-B967-44AD-AB76-1BB2CAD3CA5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*\",\"matchCriteriaId\":\"65203CA1-5225-4E55-A187-6454C091F532\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF8EFFB-5686-4F28-A68F-1A8854E098CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"932D137F-528B-4526-9A89-CD59FA1AB0FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DA9B2E2-958B-478D-87D6-E5CDDCD44315\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3F5FF1E-5DA3-4EC3-B41A-A362BDFC4C69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99B8A88B-0B31-4CFF-AFD7-C9D3DDD5790D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97321212-0E07-4CC2-A917-7B5F61AB9A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF390236-3259-4C8F-891C-62ACC4386CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0AAA300-691A-4957-8B69-F6888CC971B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45937289-2D64-47CB-A750-5B4F0D4664A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B129311C-EB4B-4041-B85C-44D5E53FCAA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1AB54DB-3FB4-41CB-88ED-1400FD22AB85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77675CB7-67D7-44E9-B7FF-D224B3341AA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A76A2BCE-4AAE-46D7-93D6-2EDE0FC83145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C877879-B84B-471C-80CF-0656521CA8AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCC81071-B46D-4F5D-AC25-B4A4CCC20C73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B3000D2-35DF-4A93-9FC0-1AD3AB8349B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E315FC5C-FF19-43C9-A58A-CF2A5FF13824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20A6B40D-F991-4712-8E30-5FE008505CB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1987BDA-0113-4603-B9BE-76647EB043F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D482A3D2-6E9B-42BA-9926-35E5BDD5F3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"848C92A9-0677-442B-8D52-A448F2019903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F564701-EDC1-43CF-BB9F-287D6992C6CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12B0CF2B-D1E1-4E20-846E-6F0D873499A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EFEC7CA-8DDA-48A6-A7B6-1F1D14792890\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8885C2C-7FB8-40CA-BCB9-B48C50BF2499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D88B140-D2A1-4A0A-A2E9-1A3B50C295AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:service_telemetry_framework:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A903C3AD-2D25-45B5-BF4A-A5BEB2286627\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC5EBD2A-32A3-46D5-B155-B44DCB7F6902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:akka:http_server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.5.3\",\"matchCriteriaId\":\"C2792650-851F-4820-B003-06A4BEA092D7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:konghq:kong_gateway:*:*:*:*:enterprise:*:*:*\",\"versionEndExcluding\":\"3.4.2\",\"matchCriteriaId\":\"9F6B63B9-F4C9-4A3F-9310-E0918E1070D1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*\",\"versionEndIncluding\":\"2.414.2\",\"matchCriteriaId\":\"E6FF5F80-A991-43D4-B49F-D843E2BC5798\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*\",\"versionEndIncluding\":\"2.427\",\"matchCriteriaId\":\"54D25DA9-12D0-4F14-83E6-C69D0293AAB9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.4.0\",\"matchCriteriaId\":\"8E1AFFB9-C717-4727-B0C9-5A0C281710E2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.21.4.3\",\"matchCriteriaId\":\"25C85001-E0AB-4B01-8EE7-1D9C77CD956E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.003.009\",\"matchCriteriaId\":\"FB2BDBAC-8D19-4F81-8D31-6D0955A53D82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.1\",\"matchCriteriaId\":\"F98F9D27-6659-413F-8F29-4FDB0882AAC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1.3\",\"matchCriteriaId\":\"C98BF315-C563-47C2-BAD1-63347A3D1008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndExcluding\":\"5.0.2\",\"matchCriteriaId\":\"3F30E209-FA52-4D3B-9B88-4193EA388554\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_situation_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3178F3A5-A072-44E1-A225-B04BC536F4FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.0\",\"matchCriteriaId\":\"AA2BE0F1-DD16-4876-8EBA-F187BD38B159\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"796B6C58-2140-4105-A2A1-69865A194A75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEA99DC6-EA03-469F-A8BE-7F96FDF0B333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"x14.3.3\",\"matchCriteriaId\":\"6560DBF4-AFE6-4672-95DE-74A0B8F4170A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.4.2\",\"matchCriteriaId\":\"84785919-796D-41E5-B652-6B5765C81D4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.11.0\",\"matchCriteriaId\":\"92A74A1A-C69F-41E6-86D0-D6BB1C5D0A1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.3.3\",\"matchCriteriaId\":\"6FE7BA33-2AC0-4A85-97AD-6D77F20BA2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.2.1\",\"matchCriteriaId\":\"4FE2F959-1084-48D1-B1F1-8182FC9862DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.10.4\",\"matchCriteriaId\":\"5CC17E6B-D7AB-40D7-AEC5-F5B555AC4D7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.2\",\"matchCriteriaId\":\"1BB6B48E-EA36-40A0-96D0-AF909BEC1147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.2.0\",\"matchCriteriaId\":\"2CBED844-7F94-498C-836D-8593381A9657\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.19.2\",\"matchCriteriaId\":\"C170DBA1-0899-4ECC-9A0D-8FEB1DA1B510\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"x14.3.3\",\"matchCriteriaId\":\"358FA1DC-63D3-49F6-AC07-9E277DD0D9DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2024.01.0\",\"matchCriteriaId\":\"BFF2D182-7599-4B81-B56B-F44EDA1384C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4868BCCA-24DE-4F24-A8AF-B3A545C0396E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2024.02.0\",\"matchCriteriaId\":\"194F7A1F-FD43-4FF7-9AE2-C13AA5567E8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2024.02.0\",\"matchCriteriaId\":\"BEC75F99-C7F0-47EB-9032-C9D3A42EBA20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6638F4E-16F7-447D-B755-52640BCB1C61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC34F742-530E-4AB4-8AFC-D1E088E256B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D31CC0E9-8E21-436B-AB84-EA1B1BC60DCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.6.2\",\"matchCriteriaId\":\"E22AD683-345B-4E16-BB9E-E9B1783E09AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C0D694-9E24-4782-B35F-D7C3E3B0F2ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.22\",\"matchCriteriaId\":\"2955BEE9-F567-4006-B96D-92E10FF84DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"17.15.1\",\"matchCriteriaId\":\"67502878-DB20-4410-ABA0-A1C5705064CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.11.2\",\"matchCriteriaId\":\"177DED2D-8089-4494-BDD9-7F84FC06CD5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:secure_web_appliance_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.1.0\",\"matchCriteriaId\":\"54A29FD3-4128-4333-8445-A7DD04A6ECF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67074526-9933-46B3-9FE3-A0BE73C5E8A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.2\\\\(7\\\\)\",\"matchCriteriaId\":\"EEB32D2E-AD9D-44A0-AEF7-689F7D2605C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.3\\\\(1\\\\)\",\"versionEndExcluding\":\"10.3\\\\(5\\\\)\",\"matchCriteriaId\":\"0A236A0A-6956-4D79-B8E5-B2D0C79FAE88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.4\\\\(1\\\\)\",\"versionEndExcluding\":\"10.4\\\\(2\\\\)\",\"matchCriteriaId\":\"BE71D34C-227A-4789-BA4D-79E5FDE311DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"528ED62B-D739-4E06-AC64-B506FD73BBAB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC2A6C31-438A-4CF5-A3F3-364B1672EB7D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C10D85-88AC-4A79-8866-BED88A0F8DF8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09AC2BAD-F536-48D0-A2F0-D4E290519EB6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECC4FFCC-E886-49BC-9737-5B5BA2AAB14B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F4E8EE4-031D-47D3-A12E-EE5F792172EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41C14CC9-C244-4B86-AEA6-C50BAD5DA9A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8FF2EC4-0C09-4C00-9956-A2A4A894F63D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D14D4B4E-120E-4607-A4F1-447C7BF3052E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15702ACB-29F3-412D-8805-E107E0729E35\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E930332-CDDD-48D5-93BC-C22D693BBFA2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29B34855-D8D2-4114-80D2-A4D159C62458\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF4B8FE-E134-4491-B5C2-C1CFEB64731B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4226DA0-9371-401C-8247-E6E636A116C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7664666F-BCE4-4799-AEEA-3A73E6AD33F4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3DBBFE9-835C-4411-8492-6006E74BAC65\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3293438-3D18-45A2-B093-2C3F65783336\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C97C29EE-9426-4BBE-8D84-AB5FF748703D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3132q-x\\\\/3132q-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E142C18F-9FB5-4D96-866A-141D7D16CAF7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F43B770-D96C-44EA-BC12-9F39FC4317B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7817F4E6-B2DA-4F06-95A4-AF329F594C02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CED628B5-97A8-4B26-AA40-BEC854982157\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BB9DD73-E31D-4921-A6D6-E14E04703588\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172pq\\\\/pq-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EFC116A-627F-4E05-B631-651D161217C8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4532F513-0543-4960-9877-01F23CA7BA1B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B43502B-FD53-465A-B60F-6A359C6ACD99\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3229124-B097-4AAC-8ACD-2F9C89DCC3AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32A532C0-B0E3-484A-B356-88970E7D0248\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C84D24C-2256-42AF-898A-221EBE9FE1E4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"652A2849-668D-4156-88FB-C19844A59F33\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D008CA1C-6F5A-40EA-BB12-A9D84D5AF700\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24FBE87B-8A4F-43A8-98A3-4A7D9C630937\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ACD09AC-8B28-4ACB-967B-AB3D450BC137\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43913A0E-50D5-47DD-94D8-DD3391633619\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D397349-CCC6-479B-9273-FB1FFF4F34F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC7286A7-780F-4A45-940A-4AD5C9D0F201\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA52D5C1-13D8-4D23-B022-954CCEF491F1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F7AF8D7-431B-43CE-840F-CC0817D159C0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAC204C8-1A5A-4E85-824E-DC9B8F6A802D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8E1073F-D374-4311-8F12-AD8C72FAA293\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAF5AF71-15DF-4151-A1CF-E138A7103FC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10F80A72-AD54-4699-B8AE-82715F0B58E2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3524-x\\\\/xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E505C0B1-2119-4C6A-BF96-C282C633D169\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9354B6A2-D7D6-442E-BF4C-FE8A336D9E94\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"088C0323-683A-44F5-8D42-FF6EC85D080E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74CB4002-7636-4382-B33E-FBA060A13C34\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3548-x\\\\/xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915EF8F6-6039-4DD0-B875-30D911752B74\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10CEBF73-3EE0-459A-86C5-F8F6243FE27C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97217080-455C-48E4-8CE1-6D5B9485864F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95D2C4C3-65CE-4612-A027-AF70CEFC3233\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57572E4A-78D5-4D1A-938B-F05F01759612\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.2\\\\(7\\\\)\",\"matchCriteriaId\":\"EEB32D2E-AD9D-44A0-AEF7-689F7D2605C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.3\\\\(1\\\\)\",\"versionEndExcluding\":\"10.3\\\\(5\\\\)\",\"matchCriteriaId\":\"0A236A0A-6956-4D79-B8E5-B2D0C79FAE88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.4\\\\(1\\\\)\",\"versionEndExcluding\":\"10.4\\\\(2\\\\)\",\"matchCriteriaId\":\"BE71D34C-227A-4789-BA4D-79E5FDE311DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD9C1F1-8582-4F67-A77D-97CBFECB88B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"532CE4B0-A3C9-4613-AAAF-727817D06FB4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9200yc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CA1A59-2681-4507-AC74-53BD481099B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4283E433-7F8C-4410-B565-471415445811\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_92160yc_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF9147C9-5D8B-40F5-9AAA-66A3495A0AD8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFB9FDE8-8533-4F65-BF32-4066D042B2F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80AB6FB-32FD-43D7-A9F1-80FA47696210\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_92300yc_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AA5389A-8AD1-476E-983A-54DF573C30F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5B2E4C1-2627-4B9D-8E92-4B483F647651\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_92304qc_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1B1A8F1-45B1-4E64-A254-7191FA93CB6D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83DA8BFA-D7A2-476C-A6F5-CAE610033BC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"557ED31C-C26A-4FAE-8B14-D06B49F7F08B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11411BFD-3F4D-4309-AB35-A3629A360FB0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9236c_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2FFD26-8255-4351-8594-29D2AEFC06EF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E663DE91-C86D-48DC-B771-FA72A8DF7A7C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9272q_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61E10975-B47E-4F4D-8096-AEC7B7733612\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92E2CB2B-DA11-4CF7-9D57-3D4D48990DC0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90184B3-C82F-4CE5-B2AD-97D5E4690871\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40E40F42-632A-47DF-BE33-DC25B826310B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93108tc-ex_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C67B7A6-9BB2-41FC-8FA3-8D0DF67CBC68\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C47F6BF9-2ADB-41A4-8D7D-8BB00141BB23\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16C64136-89C2-443C-AF7B-BED81D3DE25A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBEF7F26-BB47-44BD-872E-130820557C23\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07DE6F63-2C7D-415B-8C34-01EC05C062F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93120tx_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"182000E0-8204-4D8B-B7DE-B191AFE12E28\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F309E7B9-B828-4CD2-9D2B-8966EE5B9CC1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F423E45D-A6DD-4305-9C6A-EAB26293E53A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93128tx_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDC208BC-7E19-48C6-A20E-A79A51B7362C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102F91CD-DFB6-43D4-AE5B-DA157A696230\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E952A96A-0F48-4357-B7DD-1127D8827650\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93180lc-ex_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"084D0191-563B-4FF0-B589-F35DA118E1C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7DB6FC5-762A-4F16-AE8C-69330EFCF640\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F70D81F1-8B12-4474-9060-B4934D8A3873\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5394DE31-3863-4CA9-B7B1-E5227183100D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93180yc-ex_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"968390BC-B430-4903-B614-13104BFAE635\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7349D69B-D8FA-4462-AA28-69DD18A652D9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE4BB834-2C00-4384-A78E-AF3BCDDC58AF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0D30D52-837F-4FDA-B8E5-A9066E9C6D2F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6678B8A-D905-447E-BE7E-6BFB4CC5DAFE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CE49B45-F2E9-491D-9C29-1B46E9CE14E2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93240tc-fx2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BFAD21E-59EE-4CCE-8F1E-621D2EA50905\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91231DC6-2773-4238-8C14-A346F213B5E5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DF88547-BAF4-47B0-9F60-80A30297FCEB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02C3CE6D-BD54-48B1-A188-8E53DA001424\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"498991F7-39D6-428C-8C7D-DD8DC72A0346\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"113772B6-E9D2-4094-9468-3F4E1A87D07D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9332pq_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7B90D36-5124-4669-8462-4EAF35B0F53D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C45A38D6-BED6-4FEF-AD87-A1E813695DE0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1FC2B1F-232E-4754-8076-CC82F3648730\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CDD27C9-5EAF-4956-8AB7-740C84C9D4FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F1127D2-12C0-454F-91EF-5EE334070D06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9336pq_aci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D6EB963-E0F2-4A02-8765-AB2064BE19E9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"785FD17C-F32E-4042-9DDE-A89B3AAE0334\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9336pq_aci_spine_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEAAF99B-5406-4722-81FB-A91CBAC2DF41\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73DC1E93-561E-490C-AE0E-B02BAB9A7C8E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12DA2DE5-8ADA-4D6A-BC1A-9C06FA163B1C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF467E2-4567-426E-8F48-39669E0F514C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63842B25-8C32-4988-BBBD-61E9CB09B4F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68EA1FEF-B6B6-49FE-A0A4-5387F76303F8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40D6DB7F-C025-4971-9615-73393ED61078\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4364ADB9-8162-451D-806A-B98924E6B2CF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B53BCB42-ED61-4FCF-8068-CB467631C63C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9372px-e_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"737C724A-B6CD-4FF7-96E0-EBBF645D660E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9372px_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7067AEC7-DFC8-4437-9338-C5165D9A8F36\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E0371B-FDE2-473C-AA59-47E1269D050F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"489D11EC-5A18-4F32-BC7C-AC1FCEC27222\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9372tx-e_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71D4CF15-B293-4403-A1A9-96AD3933BAEF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9372tx_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBCC1515-2DBE-4DF2-8E83-29A869170F36\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BC5293E-F2B4-46DC-85DA-167EA323FCFD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9396px_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7282AAFF-ED18-4992-AC12-D953C35EC328\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA022E77-6557-4A33-9A3A-D028E2DB669A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9396tx_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"360409CC-4172-4878-A76B-EA1C1F8C7A79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8D5D5E2-B40B-475D-9EF3-8441016E37E9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9432pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA8E1F0-74A6-4725-B6AA-A1112EFC5D0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63BE0266-1C00-4D6A-AD96-7F82532ABAA7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9500_16-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73F59A4B-AE92-4533-8EDC-D1DD850309FF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9500_4-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"492A2C86-DD38-466B-9965-77629A73814F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9500_8-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB7AA46-4018-4925-963E-719E1037F759\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B9D1E4-10B9-4B6F-B848-D93ABF6486D6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9500_supervisor_a\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB270C45-756E-400A-979F-D07D750C881A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E8A085C-2DBA-4269-AB01-B16019FBB4DA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9500_supervisor_b\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A79DD582-AF68-44F1-B640-766B46EF2BE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B04484DA-AA59-4833-916E-6A8C96D34F0D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"768BE390-5ED5-48A7-9E80-C4DE8BA979B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9504_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07B5399-44C7-468D-9D57-BB5B5E26CE50\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC2F709-AFBE-48EA-A3A2-DA1134534FB6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9508_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76FB64F-16F0-4B0B-B304-B46258D434BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E02DC82-0D26-436F-BA64-73C958932B0A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9516_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E128053-834B-4DD5-A517-D14B4FC2B56F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9536pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"163743A1-09E7-4EC5-8ECA-79E4B9CE173B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9636pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE340E4C-DC48-4FC8-921B-EE304DB5AE0A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9716d-gx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C367BBE0-D71F-4CB5-B50E-72B033E73FE1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9736pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85E1D224-4751-4233-A127-A041068C804A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD31B075-01B1-429E-83F4-B999356A0EB9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10C9C0A-C96A-4B45-90D0-6ED457EB5F4C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3284D16F-3275-4F8D-8AE4-D413DE19C4FA\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/10/6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/10/7\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/13/4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/13/9\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/18/4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/18/8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/19/6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/20/8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2023-44487\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack\",\"source\":\"cve@mitre.org\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://blog.vespa.ai/cve-2023-44487/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.proxmox.com/show_bug.cgi?id=4988\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2242803\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1216123\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/Azure/AKS/issues/3947\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/Kong/kong/discussions/11741\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/advisories/GHSA-qppj-fm5r-hxr3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/advisories/GHSA-vx74-f528-fxqg\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/akka/akka-http/issues/4323\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/alibaba/tengine/issues/1872\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/apache/apisix/issues/10320\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/apache/httpd-site/pull/10\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/apache/trafficserver/pull/10564\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/bcdannyboy/CVE-2023-44487\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/caddyserver/caddy/issues/5877\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/caddyserver/caddy/releases/tag/v2.7.5\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/dotnet/announcements/issues/277\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\",\"Release Notes\"]},{\"url\":\"https://github.com/eclipse/jetty.project/issues/10679\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/envoyproxy/envoy/pull/30055\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/etcd-io/etcd/issues/16740\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/facebook/proxygen/pull/466\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/golang/go/issues/63417\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/grpc/grpc-go/pull/6703\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/grpc/grpc/releases/tag/v1.59.2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://github.com/h2o/h2o/pull/3291\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/haproxy/haproxy/issues/2312\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/junkurihara/rust-rpxy/issues/97\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/kazu-yamamoto/http2/issues/93\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/kubernetes/kubernetes/pull/121120\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/line/armeria/pull/5232\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/micrictor/http2-rst-stream\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/microsoft/CBL-Mariner/pull/6381\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/nghttp2/nghttp2/pull/1961\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/ninenines/cowboy/issues/1615\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/nodejs/node/pull/50121\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/openresty/openresty/issues/930\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/opensearch-project/data-prepper/issues/3474\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/oqtane/oqtane.framework/discussions/3367\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/projectcontour/contour/pull/5826\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/tempesta-tech/tempesta/issues/1986\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/varnishcache/varnish-cache/issues/3996\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://istio.io/latest/news/security/istio-security-2023-004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://my.f5.com/manage/s/article/K000137106\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://netty.io/news/2023/10/10/4-1-100-Final.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://news.ycombinator.com/item?id=37830987\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://news.ycombinator.com/item?id=37830998\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Press/Media Coverage\"]},{\"url\":\"https://news.ycombinator.com/item?id=37831062\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://news.ycombinator.com/item?id=37837043\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202311-09\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20231016-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240426-0007/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0007/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2023-44487\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://ubuntu.com/security/CVE-2023-44487\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event\",\"source\":\"cve@mitre.org\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5521\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5522\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5540\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5549\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5558\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5570\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2023/10/10/6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack\",\"source\":\"cve@mitre.org\",\"tags\":[\"Press/Media Coverage\"]},{\"url\":\"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/13/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/13/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/18/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/18/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/19/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/20/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/08/13/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2023-44487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://blog.vespa.ai/cve-2023-44487/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.proxmox.com/show_bug.cgi?id=4988\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2242803\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1216123\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/Azure/AKS/issues/3947\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/Kong/kong/discussions/11741\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/advisories/GHSA-qppj-fm5r-hxr3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/advisories/GHSA-vx74-f528-fxqg\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/akka/akka-http/issues/4323\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/alibaba/tengine/issues/1872\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/apache/apisix/issues/10320\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/apache/httpd-site/pull/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/apache/trafficserver/pull/10564\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/bcdannyboy/CVE-2023-44487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/caddyserver/caddy/issues/5877\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/caddyserver/caddy/releases/tag/v2.7.5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/dotnet/announcements/issues/277\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\",\"Release Notes\"]},{\"url\":\"https://github.com/eclipse/jetty.project/issues/10679\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/envoyproxy/envoy/pull/30055\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/etcd-io/etcd/issues/16740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/facebook/proxygen/pull/466\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/golang/go/issues/63417\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/grpc/grpc-go/pull/6703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/h2o/h2o/pull/3291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/haproxy/haproxy/issues/2312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/junkurihara/rust-rpxy/issues/97\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/kazu-yamamoto/http2/issues/93\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/kubernetes/kubernetes/pull/121120\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/line/armeria/pull/5232\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/micrictor/http2-rst-stream\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/microsoft/CBL-Mariner/pull/6381\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/nghttp2/nghttp2/pull/1961\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/ninenines/cowboy/issues/1615\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/nodejs/node/pull/50121\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/openresty/openresty/issues/930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/opensearch-project/data-prepper/issues/3474\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/oqtane/oqtane.framework/discussions/3367\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/projectcontour/contour/pull/5826\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/tempesta-tech/tempesta/issues/1986\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/varnishcache/varnish-cache/issues/3996\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://istio.io/latest/news/security/istio-security-2023-004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://my.f5.com/manage/s/article/K000137106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://netty.io/news/2023/10/10/4-1-100-Final.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://news.ycombinator.com/item?id=37830987\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://news.ycombinator.com/item?id=37830998\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Press/Media Coverage\"]},{\"url\":\"https://news.ycombinator.com/item?id=37831062\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://news.ycombinator.com/item?id=37837043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202311-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20231016-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240426-0007/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0007/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2023-44487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://ubuntu.com/security/CVE-2023-44487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5521\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5522\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5570\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2023/10/10/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\"]},{\"url\":\"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37831062\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/envoyproxy/envoy/pull/30055\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/haproxy/haproxy/issues/2312\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/eclipse/jetty.project/issues/10679\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/nghttp2/nghttp2/pull/1961\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/alibaba/tengine/issues/1872\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37830987\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37830998\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/caddyserver/caddy/issues/5877\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/bcdannyboy/CVE-2023-44487\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/grpc/grpc-go/pull/6703\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://my.f5.com/manage/s/article/K000137106\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.proxmox.com/show_bug.cgi?id=4988\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/microsoft/CBL-Mariner/pull/6381\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/facebook/proxygen/pull/466\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/micrictor/http2-rst-stream\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/h2o/h2o/pull/3291\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/nodejs/node/pull/50121\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/dotnet/announcements/issues/277\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/golang/go/issues/63417\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/advisories/GHSA-vx74-f528-fxqg\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/apache/trafficserver/pull/10564\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.openwall.com/lists/oss-security/2023/10/10/6\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/opensearch-project/data-prepper/issues/3474\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/kubernetes/kubernetes/pull/121120\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/oqtane/oqtane.framework/discussions/3367\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://netty.io/news/2023/10/10/4-1-100-Final.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://news.ycombinator.com/item?id=37837043\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/kazu-yamamoto/http2/issues/93\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5522\", \"name\": \"DSA-5522\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5521\", \"name\": \"DSA-5521\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/security/cve/cve-2023-44487\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/ninenines/cowboy/issues/1615\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/varnishcache/varnish-cache/issues/3996\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/tempesta-tech/tempesta/issues/1986\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://blog.vespa.ai/cve-2023-44487/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/etcd-io/etcd/issues/16740\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://istio.io/latest/news/security/istio-security-2023-004/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/junkurihara/rust-rpxy/issues/97\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1216123\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2242803\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://ubuntu.com/security/CVE-2023-44487\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/advisories/GHSA-qppj-fm5r-hxr3\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/apache/httpd-site/pull/10\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/projectcontour/contour/pull/5826\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/line/armeria/pull/5232\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2023-44487\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/akka/akka-http/issues/4323\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/openresty/openresty/issues/930\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/apache/apisix/issues/10320\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/Azure/AKS/issues/3947\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/Kong/kong/discussions/11741\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/caddyserver/caddy/releases/tag/v2.7.5\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html\", \"name\": \"[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/13/4\", \"name\": \"[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/13/9\", \"name\": \"[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/\", \"name\": \"FEDORA-2023-ed2642fd58\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html\", \"name\": \"[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20231016-0001/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html\", \"name\": \"[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/18/4\", \"name\": \"[oss-security] 20231018 Vulnerability in Jenkins\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/18/8\", \"name\": \"[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/19/6\", \"name\": \"[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/\", \"name\": \"FEDORA-2023-54fadada12\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/\", \"name\": \"FEDORA-2023-5ff7bf1dd8\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/20/8\", \"name\": \"[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/\", \"name\": \"FEDORA-2023-17efd3f2cd\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/\", \"name\": \"FEDORA-2023-d5030c983c\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/\", \"name\": \"FEDORA-2023-0259c3f26f\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/\", \"name\": \"FEDORA-2023-2a9214af5f\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/\", \"name\": \"FEDORA-2023-e9c04d81c1\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/\", \"name\": \"FEDORA-2023-f66fc0f62a\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/\", \"name\": \"FEDORA-2023-4d2fd884ea\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/\", \"name\": \"FEDORA-2023-b2c50535cb\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/\", \"name\": \"FEDORA-2023-fe53e13b5b\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/\", \"name\": \"FEDORA-2023-4bf641255e\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html\", \"name\": \"[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5540\", \"name\": \"DSA-5540\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html\", \"name\": \"[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/\", \"name\": \"FEDORA-2023-1caffb88af\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/\", \"name\": \"FEDORA-2023-3f70b8d406\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/\", \"name\": \"FEDORA-2023-7b52921cae\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/\", \"name\": \"FEDORA-2023-7934802344\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/\", \"name\": \"FEDORA-2023-dbe64661af\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/\", \"name\": \"FEDORA-2023-822aab0a5a\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html\", \"name\": \"[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5549\", \"name\": \"DSA-5549\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/\", \"name\": \"FEDORA-2023-c0c6a91330\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/\", \"name\": \"FEDORA-2023-492b7be466\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5558\", \"name\": \"DSA-5558\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html\", \"name\": \"[debian-lts-announce] 20231119 [SECURITY] [DLA 3656-1] netty security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202311-09\", \"name\": \"GLSA-202311-09\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5570\", \"name\": \"DSA-5570\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240426-0007/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0007/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/08/13/6\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T21:08:27.383Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-44487\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-23T20:34:21.334116Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2023-10-10\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*\"], \"vendor\": \"ietf\", \"product\": \"http\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0\"}], \"defaultStatus\": \"unknown\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2023-10-10T00:00:00+00:00\", \"value\": \"CVE-2023-44487 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-16T18:31:22.372Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73\"}, {\"url\": \"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/\"}, {\"url\": \"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/\"}, {\"url\": \"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack\"}, {\"url\": \"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\"}, {\"url\": \"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/\"}, {\"url\": \"https://news.ycombinator.com/item?id=37831062\"}, {\"url\": \"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/\"}, {\"url\": \"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack\"}, {\"url\": \"https://github.com/envoyproxy/envoy/pull/30055\"}, {\"url\": \"https://github.com/haproxy/haproxy/issues/2312\"}, {\"url\": \"https://github.com/eclipse/jetty.project/issues/10679\"}, {\"url\": \"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764\"}, {\"url\": \"https://github.com/nghttp2/nghttp2/pull/1961\"}, {\"url\": \"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61\"}, {\"url\": \"https://github.com/alibaba/tengine/issues/1872\"}, {\"url\": \"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2\"}, {\"url\": \"https://news.ycombinator.com/item?id=37830987\"}, {\"url\": \"https://news.ycombinator.com/item?id=37830998\"}, {\"url\": \"https://github.com/caddyserver/caddy/issues/5877\"}, {\"url\": \"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/\"}, {\"url\": \"https://github.com/bcdannyboy/CVE-2023-44487\"}, {\"url\": \"https://github.com/grpc/grpc-go/pull/6703\"}, {\"url\": \"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244\"}, {\"url\": \"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0\"}, {\"url\": \"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html\"}, {\"url\": \"https://my.f5.com/manage/s/article/K000137106\"}, {\"url\": \"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/\"}, {\"url\": \"https://bugzilla.proxmox.com/show_bug.cgi?id=4988\"}, {\"url\": \"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/10/7\", \"name\": \"[oss-security] 20231010 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations\", \"tags\": [\"mailing-list\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/10/6\", \"name\": \"[oss-security] 20231010 CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected\"}, {\"url\": \"https://github.com/microsoft/CBL-Mariner/pull/6381\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo\"}, {\"url\": \"https://github.com/facebook/proxygen/pull/466\"}, {\"url\": \"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088\"}, {\"url\": \"https://github.com/micrictor/http2-rst-stream\"}, {\"url\": \"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve\"}, {\"url\": \"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/\"}, {\"url\": \"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf\"}, {\"url\": \"https://github.com/h2o/h2o/pull/3291\"}, {\"url\": \"https://github.com/nodejs/node/pull/50121\"}, {\"url\": \"https://github.com/dotnet/announcements/issues/277\"}, {\"url\": \"https://github.com/golang/go/issues/63417\"}, {\"url\": \"https://github.com/advisories/GHSA-vx74-f528-fxqg\"}, {\"url\": \"https://github.com/apache/trafficserver/pull/10564\"}, {\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487\"}, {\"url\": \"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14\"}, {\"url\": \"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q\"}, {\"url\": \"https://www.openwall.com/lists/oss-security/2023/10/10/6\"}, {\"url\": \"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\"}, {\"url\": \"https://github.com/opensearch-project/data-prepper/issues/3474\"}, {\"url\": \"https://github.com/kubernetes/kubernetes/pull/121120\"}, {\"url\": \"https://github.com/oqtane/oqtane.framework/discussions/3367\"}, {\"url\": \"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p\"}, {\"url\": \"https://netty.io/news/2023/10/10/4-1-100-Final.html\"}, {\"url\": \"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487\"}, {\"url\": \"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/\"}, {\"url\": \"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack\"}, {\"url\": \"https://news.ycombinator.com/item?id=37837043\"}, {\"url\": \"https://github.com/kazu-yamamoto/http2/issues/93\"}, {\"url\": \"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html\"}, {\"url\": \"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1\"}, {\"url\": \"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113\"}, {\"url\": \"https://www.debian.org/security/2023/dsa-5522\", \"name\": \"DSA-5522\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5521\", \"name\": \"DSA-5521\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://access.redhat.com/security/cve/cve-2023-44487\"}, {\"url\": \"https://github.com/ninenines/cowboy/issues/1615\"}, {\"url\": \"https://github.com/varnishcache/varnish-cache/issues/3996\"}, {\"url\": \"https://github.com/tempesta-tech/tempesta/issues/1986\"}, {\"url\": \"https://blog.vespa.ai/cve-2023-44487/\"}, {\"url\": \"https://github.com/etcd-io/etcd/issues/16740\"}, {\"url\": \"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event\"}, {\"url\": \"https://istio.io/latest/news/security/istio-security-2023-004/\"}, {\"url\": \"https://github.com/junkurihara/rust-rpxy/issues/97\"}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1216123\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2242803\"}, {\"url\": \"https://ubuntu.com/security/CVE-2023-44487\"}, {\"url\": \"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125\"}, {\"url\": \"https://github.com/advisories/GHSA-qppj-fm5r-hxr3\"}, {\"url\": \"https://github.com/apache/httpd-site/pull/10\"}, {\"url\": \"https://github.com/projectcontour/contour/pull/5826\"}, {\"url\": \"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632\"}, {\"url\": \"https://github.com/line/armeria/pull/5232\"}, {\"url\": \"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/\"}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2023-44487\"}, {\"url\": \"https://github.com/akka/akka-http/issues/4323\"}, {\"url\": \"https://github.com/openresty/openresty/issues/930\"}, {\"url\": \"https://github.com/apache/apisix/issues/10320\"}, {\"url\": \"https://github.com/Azure/AKS/issues/3947\"}, {\"url\": \"https://github.com/Kong/kong/discussions/11741\"}, {\"url\": \"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487\"}, {\"url\": \"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/\"}, {\"url\": \"https://github.com/caddyserver/caddy/releases/tag/v2.7.5\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html\", \"name\": \"[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/13/4\", \"name\": \"[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations\", \"tags\": [\"mailing-list\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/13/9\", \"name\": \"[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/\"}, {\"url\": \"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/\", \"name\": \"FEDORA-2023-ed2642fd58\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html\", \"name\": \"[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20231016-0001/\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html\", \"name\": \"[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/18/4\", \"name\": \"[oss-security] 20231018 Vulnerability in Jenkins\", \"tags\": [\"mailing-list\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/18/8\", \"name\": \"[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations\", \"tags\": [\"mailing-list\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/19/6\", \"name\": \"[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/\", \"name\": \"FEDORA-2023-54fadada12\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/\", \"name\": \"FEDORA-2023-5ff7bf1dd8\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/20/8\", \"name\": \"[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/\", \"name\": \"FEDORA-2023-17efd3f2cd\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/\", \"name\": \"FEDORA-2023-d5030c983c\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/\", \"name\": \"FEDORA-2023-0259c3f26f\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/\", \"name\": \"FEDORA-2023-2a9214af5f\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/\", \"name\": \"FEDORA-2023-e9c04d81c1\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/\", \"name\": \"FEDORA-2023-f66fc0f62a\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/\", \"name\": \"FEDORA-2023-4d2fd884ea\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/\", \"name\": \"FEDORA-2023-b2c50535cb\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/\", \"name\": \"FEDORA-2023-fe53e13b5b\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/\", \"name\": \"FEDORA-2023-4bf641255e\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html\", \"name\": \"[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5540\", \"name\": \"DSA-5540\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html\", \"name\": \"[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/\", \"name\": \"FEDORA-2023-1caffb88af\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/\", \"name\": \"FEDORA-2023-3f70b8d406\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/\", \"name\": \"FEDORA-2023-7b52921cae\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/\", \"name\": \"FEDORA-2023-7934802344\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/\", \"name\": \"FEDORA-2023-dbe64661af\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/\", \"name\": \"FEDORA-2023-822aab0a5a\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html\", \"name\": \"[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5549\", \"name\": \"DSA-5549\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/\", \"name\": \"FEDORA-2023-c0c6a91330\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/\", \"name\": \"FEDORA-2023-492b7be466\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5558\", \"name\": \"DSA-5558\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html\", \"name\": \"[debian-lts-announce] 20231119 [SECURITY] [DLA 3656-1] netty security update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://security.gentoo.org/glsa/202311-09\", \"name\": \"GLSA-202311-09\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5570\", \"name\": \"DSA-5570\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240426-0007/\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0007/\"}, {\"url\": \"https://github.com/grpc/grpc/releases/tag/v1.59.2\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2025-06-07T20:05:34.376Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-44487\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T21:08:27.383Z\", \"dateReserved\": \"2023-09-29T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-10-10T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2023:6298
Vulnerability from csaf_redhat - Published: 2023-11-03 08:48 - Updated: 2026-01-21 10:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Serverless 1.30.2 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Serverless Client kn 1.30.2 provides a CLI to interact with Red Hat OpenShift Serverless 1.30.2. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.\n\nThis release includes security and bug fixes, and enhancements.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (Rapid Reset Attack) (CVE-2023-39325)\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\n* golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)\n\n* golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)\n\nA Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6298",
"url": "https://access.redhat.com/errata/RHSA-2023:6298"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_serverless/1.30",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_serverless/1.30"
},
{
"category": "external",
"summary": "2222167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222167"
},
{
"category": "external",
"summary": "2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6298.json"
}
],
"title": "Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.30.2 security update",
"tracking": {
"current_release_date": "2026-01-21T10:16:04+00:00",
"generator": {
"date": "2026-01-21T10:16:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:6298",
"initial_release_date": "2023-11-03T08:48:21+00:00",
"revision_history": [
{
"date": "2023-11-03T08:48:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-03T08:48:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T10:16:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Serverless 1.0",
"product": {
"name": "Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:serverless:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Serverless"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:1.9.2-4.el8.src",
"product": {
"name": "openshift-serverless-clients-0:1.9.2-4.el8.src",
"product_id": "openshift-serverless-clients-0:1.9.2-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@1.9.2-4.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:1.9.2-4.el8.x86_64",
"product": {
"name": "openshift-serverless-clients-0:1.9.2-4.el8.x86_64",
"product_id": "openshift-serverless-clients-0:1.9.2-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@1.9.2-4.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"product": {
"name": "openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"product_id": "openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@1.9.2-4.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"product": {
"name": "openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"product_id": "openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@1.9.2-4.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:1.9.2-4.el8.ppc64le as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le"
},
"product_reference": "openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:1.9.2-4.el8.s390x as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x"
},
"product_reference": "openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:1.9.2-4.el8.src as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src"
},
"product_reference": "openshift-serverless-clients-0:1.9.2-4.el8.src",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:1.9.2-4.el8.x86_64 as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
},
"product_reference": "openshift-serverless-clients-0:1.9.2-4.el8.x86_64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-29406",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2023-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2222167"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang, where it is vulnerable to HTTP header injection caused by improper content validation of the Host header by the HTTP/1 client. A remote attacker can inject arbitrary HTTP headers by persuading a victim to visit a specially crafted Web page. This flaw allows the attacker to conduct various attacks against the vulnerable system, including Cross-site scripting, cache poisoning, or session hijacking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: insufficient sanitization of Host header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29406"
},
{
"category": "external",
"summary": "RHBZ#2222167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0",
"url": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0"
}
],
"release_date": "2023-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-03T08:48:21+00:00",
"details": "https://access.redhat.com/documentation/en-us/red_hat_openshift_serverless/1.30",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6298"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: insufficient sanitization of Host header"
},
{
"cve": "CVE-2023-29409",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-08-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228743"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29409"
},
{
"category": "external",
"summary": "RHBZ#2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409"
},
{
"category": "external",
"summary": "https://go.dev/cl/515257",
"url": "https://go.dev/cl/515257"
},
{
"category": "external",
"summary": "https://go.dev/issue/61460",
"url": "https://go.dev/issue/61460"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ",
"url": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-1987",
"url": "https://pkg.go.dev/vuln/GO-2023-1987"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-03T08:48:21+00:00",
"details": "https://access.redhat.com/documentation/en-us/red_hat_openshift_serverless/1.30",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6298"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys"
},
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-03T08:48:21+00:00",
"details": "https://access.redhat.com/documentation/en-us/red_hat_openshift_serverless/1.30",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6298"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-03T08:48:21+00:00",
"details": "https://access.redhat.com/documentation/en-us/red_hat_openshift_serverless/1.30",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6298"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.9.2-4.el8.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_6042
Vulnerability from csaf_redhat - Published: 2023-10-23 18:39 - Updated: 2024-12-18 04:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "This is an updated version of the Self Node Remediation Operator. This Operator is delivered by Red Hat Workload Availability.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Self Node Remediation Operator works in conjunction with machine health check or node health check to provide automatic remediation of unhealthy nodes by rebooting them. This minimizes downtime for stateful applications and ReadWriteOnce (RWO) Volumes, as well as restoring compute capacity in the event of transient failures. \n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6042",
"url": "https://access.redhat.com/errata/RHSA-2023:6042"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6042.json"
}
],
"title": "Red Hat Security Advisory: Self Node Remediation Operator 0.5.1 security update",
"tracking": {
"current_release_date": "2024-12-18T04:48:48+00:00",
"generator": {
"date": "2024-12-18T04:48:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:6042",
"initial_release_date": "2023-10-23T18:39:36+00:00",
"revision_history": [
{
"date": "2023-10-23T18:39:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-23T18:39:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T04:48:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Self Node Remediation 0.5 for RHEL 8",
"product": {
"name": "Self Node Remediation 0.5 for RHEL 8",
"product_id": "8Base-SELF-NODE-REMEDIATION-0.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:workload_availability_self_node_remediation:0.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Workload Availability"
},
{
"branches": [
{
"category": "product_version",
"name": "workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"product": {
"name": "workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"product_id": "workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2?arch=amd64\u0026repository_url=registry.redhat.io/workload-availability/self-node-remediation-must-gather-rhel8\u0026tag=v0.5.1-45"
}
}
},
{
"category": "product_version",
"name": "workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64",
"product": {
"name": "workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64",
"product_id": "workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3?arch=amd64\u0026repository_url=registry.redhat.io/workload-availability/self-node-remediation-operator-bundle\u0026tag=v0.5.1-45"
}
}
},
{
"category": "product_version",
"name": "workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64",
"product": {
"name": "workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64",
"product_id": "workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3?arch=amd64\u0026repository_url=registry.redhat.io/workload-availability/self-node-remediation-rhel8-operator\u0026tag=v0.5.1-45"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64 as a component of Self Node Remediation 0.5 for RHEL 8",
"product_id": "8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64"
},
"product_reference": "workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"relates_to_product_reference": "8Base-SELF-NODE-REMEDIATION-0.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64 as a component of Self Node Remediation 0.5 for RHEL 8",
"product_id": "8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64"
},
"product_reference": "workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64",
"relates_to_product_reference": "8Base-SELF-NODE-REMEDIATION-0.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64 as a component of Self Node Remediation 0.5 for RHEL 8",
"product_id": "8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64"
},
"product_reference": "workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64",
"relates_to_product_reference": "8Base-SELF-NODE-REMEDIATION-0.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64"
],
"known_not_affected": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-23T18:39:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6042"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64"
],
"known_not_affected": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-23T18:39:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6042"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-must-gather-rhel8@sha256:0abf7c74783c4c310937b63cf6f2965e8eb076007691176ee4d7e76b956257c2_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-operator-bundle@sha256:36561e5888cd34f8fb83ceff2910141fceaa6ea290bd246125930fe183e2ebc3_amd64",
"8Base-SELF-NODE-REMEDIATION-0.5:workload-availability/self-node-remediation-rhel8-operator@sha256:8f1d095530f102c6edbcb53a9c2685a043a9c9869b7ca6c1d254dd74ee17b0a3_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_7637
Vulnerability from csaf_redhat - Published: 2023-12-04 18:01 - Updated: 2024-12-17 04:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.14 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.13, and includes bug fixes and enhancements.\n\nSee the Red Hat JBoss Enterprise Application Platform 7.4.14 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\n* avro: apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK (CVE-2023-39410)\n\n* guava: insecure temporary directory creation (CVE-2023-2976)\n\n* eap-galleon: custom provisioning creates unsecured http-invoker (CVE-2023-4503)\n\n* jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() (CVE-2023-26048)\n\n* jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies (CVE-2023-26049)\n\n* sshd-common: apache-mina-sshd: information exposure in SFTP server implementations (CVE-2023-35887)\n\nA Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7637",
"url": "https://access.redhat.com/errata/RHSA-2023:7637"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
},
{
"category": "external",
"summary": "2184751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184751"
},
{
"category": "external",
"summary": "2215229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215229"
},
{
"category": "external",
"summary": "2236340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236340"
},
{
"category": "external",
"summary": "2236341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236341"
},
{
"category": "external",
"summary": "2240036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240036"
},
{
"category": "external",
"summary": "2242521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242521"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "JBEAP-25004",
"url": "https://issues.redhat.com/browse/JBEAP-25004"
},
{
"category": "external",
"summary": "JBEAP-25085",
"url": "https://issues.redhat.com/browse/JBEAP-25085"
},
{
"category": "external",
"summary": "JBEAP-25086",
"url": "https://issues.redhat.com/browse/JBEAP-25086"
},
{
"category": "external",
"summary": "JBEAP-25378",
"url": "https://issues.redhat.com/browse/JBEAP-25378"
},
{
"category": "external",
"summary": "JBEAP-25380",
"url": "https://issues.redhat.com/browse/JBEAP-25380"
},
{
"category": "external",
"summary": "JBEAP-25419",
"url": "https://issues.redhat.com/browse/JBEAP-25419"
},
{
"category": "external",
"summary": "JBEAP-25451",
"url": "https://issues.redhat.com/browse/JBEAP-25451"
},
{
"category": "external",
"summary": "JBEAP-25457",
"url": "https://issues.redhat.com/browse/JBEAP-25457"
},
{
"category": "external",
"summary": "JBEAP-25541",
"url": "https://issues.redhat.com/browse/JBEAP-25541"
},
{
"category": "external",
"summary": "JBEAP-25547",
"url": "https://issues.redhat.com/browse/JBEAP-25547"
},
{
"category": "external",
"summary": "JBEAP-25576",
"url": "https://issues.redhat.com/browse/JBEAP-25576"
},
{
"category": "external",
"summary": "JBEAP-25594",
"url": "https://issues.redhat.com/browse/JBEAP-25594"
},
{
"category": "external",
"summary": "JBEAP-25627",
"url": "https://issues.redhat.com/browse/JBEAP-25627"
},
{
"category": "external",
"summary": "JBEAP-25657",
"url": "https://issues.redhat.com/browse/JBEAP-25657"
},
{
"category": "external",
"summary": "JBEAP-25685",
"url": "https://issues.redhat.com/browse/JBEAP-25685"
},
{
"category": "external",
"summary": "JBEAP-25700",
"url": "https://issues.redhat.com/browse/JBEAP-25700"
},
{
"category": "external",
"summary": "JBEAP-25716",
"url": "https://issues.redhat.com/browse/JBEAP-25716"
},
{
"category": "external",
"summary": "JBEAP-25726",
"url": "https://issues.redhat.com/browse/JBEAP-25726"
},
{
"category": "external",
"summary": "JBEAP-25772",
"url": "https://issues.redhat.com/browse/JBEAP-25772"
},
{
"category": "external",
"summary": "JBEAP-25779",
"url": "https://issues.redhat.com/browse/JBEAP-25779"
},
{
"category": "external",
"summary": "JBEAP-25803",
"url": "https://issues.redhat.com/browse/JBEAP-25803"
},
{
"category": "external",
"summary": "JBEAP-25838",
"url": "https://issues.redhat.com/browse/JBEAP-25838"
},
{
"category": "external",
"summary": "JBEAP-26041",
"url": "https://issues.redhat.com/browse/JBEAP-26041"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7637.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.14 on RHEL 7 security update",
"tracking": {
"current_release_date": "2024-12-17T04:52:06+00:00",
"generator": {
"date": "2024-12-17T04:52:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:7637",
"initial_release_date": "2023-12-04T18:01:18+00:00",
"revision_history": [
{
"date": "2023-12-04T18:01:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-12-04T18:01:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T04:52:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jandex@2.4.4-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"product_id": "eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-avro@1.11.3-1.redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src",
"product": {
"name": "eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src",
"product_id": "eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-yasson@1.0.11-4.redhat_00002.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-transaction-client@1.1.16-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.20-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.8.11-1.SP1_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.14-1.SP1_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.18-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.9-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jgroups@4.2.23-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.32-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"product_id": "eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-sshd@2.9.3-1.redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-jsp-api_2.3_spec@2.0.1-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"product_id": "eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.28-1.SP1_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"product": {
"name": "eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"product_id": "eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis@2.16.0-17.redhat_00051.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"product_id": "eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-guava-libraries@32.1.1-2.jre_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-weld-core@3.1.10-2.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-33.Final_redhat_00032.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"product_id": "eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.14-5.GA_redhat_00002.1.el7eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jandex@2.4.4-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-avro@1.11.3-1.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"product_id": "eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-yasson@1.0.11-4.redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-transaction-client@1.1.16-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.20-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.8.11-1.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.14-1.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling-river@2.0.14-1.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.18-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-jdbc@11.0.18-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-remote@11.0.18-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-client-hotrod@11.0.18-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-commons@11.0.18-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-component-annotations@11.0.18-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-core@11.0.18-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-commons@11.0.18-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-spi@11.0.18-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-v53@11.0.18-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.9-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jgroups@4.2.23-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.32-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-core@5.3.32-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-entitymanager@5.3.32-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-envers@5.3.32-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-java8@5.3.32-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-sshd@2.9.3-1.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-jsp-api_2.3_spec@2.0.1-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.28-1.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-cli@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-commons@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-core-client@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-dto@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-hornetq-protocol@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-hqclient-protocol@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jdbc-store@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jms-client@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jms-server@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-journal@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-ra@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-selector@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-server@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-service-extensions@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-tools@2.16.0-17.redhat_00051.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-guava@32.1.1-2.jre_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-guava-libraries@32.1.1-2.jre_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-weld-core@3.1.10-2.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-weld-core-impl@3.1.10-2.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-weld-core-jsf@3.1.10-2.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-weld-ejb@3.1.10-2.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-weld-jta@3.1.10-2.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-weld-probe-core@3.1.10-2.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-weld-web@3.1.10-2.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-33.Final_redhat_00032.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-33.Final_redhat_00032.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-33.Final_redhat_00032.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.14-5.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.14-5.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.14-5.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.14-5.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.14-5.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src"
},
"product_reference": "eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
},
"product_reference": "eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215229"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Guava. The methodology for temporary directories and files can allow other local users or apps with accordant permissions to access the temp files, possibly leading to information exposure or tampering in the files created in the directory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "guava: insecure temporary directory creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Single Sign-On 7 ships the affected component as a layered product of Red Hat JBoss Enterprise Application 7, and as such is affected by this flaw. However, Single Sign-On 7 does not use the affected code and is not vulnerable to exploit.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2976"
},
{
"category": "external",
"summary": "RHBZ#2215229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215229"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2976"
}
],
"release_date": "2023-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-04T18:01:18+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7637"
},
{
"category": "workaround",
"details": "Temp files should be created with sufficiently non-predictable names and in a secure-permissioned, dedicated temp folder.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "guava: insecure temporary directory creation"
},
{
"cve": "CVE-2023-4503",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2022-11-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184751"
}
],
"notes": [
{
"category": "description",
"text": "An improper initialization vulnerability was found in Galleon. When using Galleon to provision custom EAP or EAP-XP servers, the servers are created unsecured. This issue could allow an attacker to access remote HTTP services available from the server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "eap-galleon: custom provisioning creates unsecured http-invoker",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-4503"
},
{
"category": "external",
"summary": "RHBZ#2184751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184751"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-4503",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-4503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4503"
}
],
"release_date": "2023-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-04T18:01:18+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7637"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "eap-galleon: custom provisioning creates unsecured http-invoker"
},
{
"cve": "CVE-2023-5685",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in XNIO. The XNIO NotifierState that can cause a Stack Overflow Exception when the chain of notifier states becomes problematically large can lead to uncontrolled resource management and a possible denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xnio: StackOverflowException when the chain of notifier states becomes problematically big",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this vulnerability as an Important impact as the uncontrolled resource consumption may lead to Denial of Service (DoS). This might be intentioned by an attacker who is looking to jeopardize an environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5685"
},
{
"category": "external",
"summary": "RHBZ#2241822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5685"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-04T18:01:18+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7637"
},
{
"category": "workaround",
"details": "There is currently no mitigation available for this vulnerability. Please keep the packages up-to-date as the updates become available.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xnio: StackOverflowException when the chain of notifier states becomes problematically big"
},
{
"cve": "CVE-2023-26048",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the jetty-server package. A servlet with multipart support could get an OutOfMemorryError when the client sends a part that has a name but no filename and substantial content. This flaw allows a malicious user to jeopardize the environment by leaving the JVM in an unreliable state.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26048"
},
{
"category": "external",
"summary": "RHBZ#2236340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26048",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26048"
},
{
"category": "external",
"summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-qw69-rqj8-6qw8",
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-qw69-rqj8-6qw8"
}
],
"release_date": "2023-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-04T18:01:18+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7637"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()"
},
{
"cve": "CVE-2023-26049",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2023-08-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236341"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the jetty-server package. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies or otherwise perform unintended behavior by tampering with the cookie parsing mechanism.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26049"
},
{
"category": "external",
"summary": "RHBZ#2236341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26049"
},
{
"category": "external",
"summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c",
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c"
}
],
"release_date": "2023-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-04T18:01:18+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7637"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies"
},
{
"cve": "CVE-2023-35887",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2023-09-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2240036"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Mina SSHD that could be exploited on certain SFTP servers implemented using the Apache Mina RootedFileSystem. This issue could permit authenticated users to view information outside of their permissions scope.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-mina-sshd: information exposure in SFTP server implementations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-35887"
},
{
"category": "external",
"summary": "RHBZ#2240036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240036"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-35887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35887"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35887",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35887"
}
],
"release_date": "2023-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-04T18:01:18+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7637"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-mina-sshd: information exposure in SFTP server implementations"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242521"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in apache-avro. When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints, leading to an out-of-memory error and a denial of service on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39410"
},
{
"category": "external",
"summary": "RHBZ#2242521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39410",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39410"
},
{
"category": "external",
"summary": "https://issues.apache.org/jira/browse/AVRO-3819",
"url": "https://issues.apache.org/jira/browse/AVRO-3819"
}
],
"release_date": "2023-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-04T18:01:18+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7637"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-04T18:01:18+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7637"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-17.redhat_00051.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-17.redhat_00051.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-sshd-0:2.9.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-avro-0:1.11.3-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-guava-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.32-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.32-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.18-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.18-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jandex-0:2.4.4-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-jsp-api_2.3_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.14-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.14-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-33.Final_redhat_00032.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-33.Final_redhat_00032.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.9-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jgroups-0:4.2.23-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.28-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-weld-core-impl-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-core-jsf-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-ejb-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-jta-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-probe-core-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-weld-web-0:3.1.10-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.14-5.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.14-5.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-transaction-client-0:1.1.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-yasson-0:1.0.11-4.redhat_00002.1.el7eap.src"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_6129
Vulnerability from csaf_redhat - Published: 2023-10-30 12:59 - Updated: 2024-12-18 04:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.13.19 is now available with updates to packages and images that fix several bugs.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.13.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.19. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2023:6130\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive\nwork (CVE-2023-39325) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6129",
"url": "https://access.redhat.com/errata/RHSA-2023:6129"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6129.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.13.19 security and extras update",
"tracking": {
"current_release_date": "2024-12-18T04:51:01+00:00",
"generator": {
"date": "2024-12-18T04:51:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:6129",
"initial_release_date": "2023-10-30T12:59:18+00:00",
"revision_history": [
{
"date": "2023-10-30T12:59:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-30T12:59:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T04:51:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.13",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.13::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.13",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.13::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"product": {
"name": "openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"product_id": "openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.13.0-202310210425.p0.g27e89a0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"product": {
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.13.0-202310210425.p0.g9183d5c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"product": {
"name": "openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"product_id": "openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.13.0-202310241102.p0.ga1d6dd8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"product": {
"name": "openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"product_id": "openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.13.0-202310210425.p0.g8db1084.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"product": {
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g8db1084.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"product": {
"name": "openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"product_id": "openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.13.0-202310231526.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"product": {
"name": "openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"product_id": "openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.13.0-202310241102.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"product": {
"name": "openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"product_id": "openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.13.0-202310210425.p0.g79c2147.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"product": {
"name": "openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"product_id": "openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"product": {
"name": "openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"product_id": "openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.13.0-202310210425.p0.g3c223bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"product": {
"name": "openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"product_id": "openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"product": {
"name": "openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"product_id": "openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"product": {
"name": "openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"product_id": "openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"product": {
"name": "openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"product_id": "openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"product": {
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.13.0-202310210425.p0.g0c90011.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"product": {
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.13.0-202310210425.p0.g645056f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.g5a1cb7d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.13.0-202310210425.p0.g5a1cb7d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"product": {
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.13.0-202310240926.p0.g63d864a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"product": {
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.13.0-202310240926.p0.g9e3cfa4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"product": {
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.13.0-202310210425.p0.g9724dcf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"product": {
"name": "openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"product_id": "openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"product": {
"name": "openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"product_id": "openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"product_identification_helper": {
"purl": "pkg:oci/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.13.0-202310210425.p0.gb9ba60f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"product": {
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.g0c90011.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"product": {
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.13.0-202310231526.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"product": {
"name": "openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"product_id": "openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00?arch=s390x\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.13.0-202310210425.p0.gd3c8a0d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"product": {
"name": "openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"product_id": "openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.13.0-202310210425.p0.gd3c8a0d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"product": {
"name": "openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"product_id": "openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g6267b32.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"product": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.13.0-202310210425.p0.gc58c53b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"product": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.gdc186bf.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"product": {
"name": "openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"product_id": "openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.13.0-202310210425.p0.g27e89a0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"product": {
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.13.0-202310210425.p0.g9183d5c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"product": {
"name": "openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"product_id": "openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel8\u0026tag=v4.13.0-202310210425.p0.gc423635.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"product": {
"name": "openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"product_id": "openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.13.0-202310210425.p0.gc423635.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"product": {
"name": "openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"product_id": "openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.13.0-202310241102.p0.ga1d6dd8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"product": {
"name": "openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"product_id": "openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/dpu-network-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g35cbabd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"product": {
"name": "openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"product_id": "openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.13.0-202310210425.p0.g000884f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"product": {
"name": "openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"product_id": "openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.13.0-202310210425.p0.g8db1084.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"product": {
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g8db1084.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"product": {
"name": "openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"product_id": "openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.13.0-202310231526.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"product": {
"name": "openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"product_id": "openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.13.0-202310241102.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"product": {
"name": "openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"product_id": "openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.13.0-202310210425.p0.g79c2147.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"product": {
"name": "openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"product_id": "openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"product": {
"name": "openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"product_id": "openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.13.0-202310210425.p0.g3c223bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"product": {
"name": "openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"product_id": "openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"product": {
"name": "openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"product_id": "openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"product": {
"name": "openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"product_id": "openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64",
"product": {
"name": "openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64",
"product_id": "openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"product": {
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.13.0-202310210425.p0.g0c90011.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"product": {
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.13.0-202310210425.p0.g645056f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"product": {
"name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"product_id": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel8\u0026tag=v4.13.0-202310231526.p0.gfb4c1be.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"product": {
"name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"product_id": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g4e77e92.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.g5a1cb7d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.13.0-202310210425.p0.g5a1cb7d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"product": {
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.13.0-202310240926.p0.g63d864a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"product": {
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.13.0-202310240926.p0.g9e3cfa4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"product": {
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.13.0-202310210425.p0.g9724dcf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"product": {
"name": "openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"product_id": "openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"product": {
"name": "openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"product_id": "openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.13.0-202310210425.p0.gb9ba60f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"product": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8\u0026tag=v4.13.0-202310231526.p0.g7ff360a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"product": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.gc7d7f1f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"product": {
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.g0c90011.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"product": {
"name": "openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"product_id": "openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.13.0-202310210425.p0.ga6b24bd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"product": {
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.13.0-202310231526.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"product": {
"name": "openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"product_id": "openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda?arch=amd64\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.13.0-202310210425.p0.gd3c8a0d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"product": {
"name": "openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"product_id": "openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.13.0-202310210425.p0.gd3c8a0d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"product": {
"name": "openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"product_id": "openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g6267b32.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"product": {
"name": "openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"product_id": "openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.13.0-202310241102.p0.g1763e62.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"product": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.13.0-202310210425.p0.gc58c53b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"product": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.gdc186bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"product": {
"name": "openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"product_id": "openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.13.0-202310210425.p0.g1763e62.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"product": {
"name": "openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"product_id": "openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/sriov-cni-rhel9\u0026tag=v4.13.0-202310210425.p0.g5b591b3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"product": {
"name": "openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.13.0-202310210425.p0.gdb24b2a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"product": {
"name": "openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"product_id": "openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.13.0-202310210425.p0.g04f97d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"product": {
"name": "openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"product_id": "openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.13.0-202310210425.p0.g385c421.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"product": {
"name": "openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"product_id": "openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.13.0-202310210425.p0.g04f97d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"product": {
"name": "openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"product_id": "openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.13.0-202310210425.p0.g04f97d5.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"product": {
"name": "openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"product_id": "openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.13.0-202310210425.p0.g27e89a0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"product": {
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.13.0-202310210425.p0.g9183d5c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"product": {
"name": "openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"product_id": "openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel8\u0026tag=v4.13.0-202310210425.p0.gc423635.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"product": {
"name": "openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"product_id": "openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.13.0-202310210425.p0.gc423635.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"product": {
"name": "openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"product_id": "openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.13.0-202310241102.p0.ga1d6dd8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"product": {
"name": "openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"product_id": "openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/dpu-network-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g35cbabd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"product": {
"name": "openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"product_id": "openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.13.0-202310210425.p0.g000884f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"product": {
"name": "openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"product_id": "openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.13.0-202310210425.p0.g8db1084.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"product": {
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g8db1084.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"product": {
"name": "openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"product_id": "openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.13.0-202310231526.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"product": {
"name": "openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"product_id": "openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.13.0-202310241102.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"product": {
"name": "openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"product_id": "openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.13.0-202310210425.p0.g79c2147.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"product": {
"name": "openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"product_id": "openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"product": {
"name": "openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"product_id": "openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.13.0-202310210425.p0.g3c223bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"product": {
"name": "openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"product_id": "openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"product": {
"name": "openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"product_id": "openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"product": {
"name": "openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"product_id": "openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"product": {
"name": "openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"product_id": "openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"product": {
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.13.0-202310210425.p0.g0c90011.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"product": {
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.13.0-202310210425.p0.g645056f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"product": {
"name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"product_id": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel8\u0026tag=v4.13.0-202310231526.p0.gfb4c1be.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"product": {
"name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"product_id": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g4e77e92.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"product": {
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.g5a1cb7d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"product": {
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.13.0-202310210425.p0.g5a1cb7d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"product": {
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.13.0-202310240926.p0.g63d864a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"product": {
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.13.0-202310240926.p0.g9e3cfa4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"product": {
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.13.0-202310210425.p0.g9724dcf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"product": {
"name": "openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"product_id": "openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"product": {
"name": "openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"product_id": "openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.13.0-202310210425.p0.gb9ba60f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"product": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8\u0026tag=v4.13.0-202310231526.p0.g7ff360a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"product": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.gc7d7f1f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"product": {
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.g0c90011.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"product": {
"name": "openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"product_id": "openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.13.0-202310210425.p0.ga6b24bd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"product": {
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.13.0-202310231526.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"product": {
"name": "openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"product_id": "openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79?arch=arm64\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.13.0-202310210425.p0.gd3c8a0d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"product": {
"name": "openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"product_id": "openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.13.0-202310210425.p0.gd3c8a0d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"product": {
"name": "openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"product_id": "openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g6267b32.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"product": {
"name": "openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"product_id": "openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.13.0-202310241102.p0.g1763e62.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"product": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.13.0-202310210425.p0.gc58c53b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"product": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.gdc186bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"product": {
"name": "openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"product_id": "openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.13.0-202310210425.p0.g1763e62.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64",
"product": {
"name": "openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64",
"product_id": "openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/sriov-cni-rhel9\u0026tag=v4.13.0-202310210425.p0.g5b591b3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"product": {
"name": "openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.13.0-202310210425.p0.gdb24b2a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"product": {
"name": "openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"product_id": "openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.13.0-202310210425.p0.g04f97d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"product": {
"name": "openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"product_id": "openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.13.0-202310210425.p0.g385c421.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"product": {
"name": "openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"product_id": "openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.13.0-202310210425.p0.g04f97d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"product": {
"name": "openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"product_id": "openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.13.0-202310210425.p0.g04f97d5.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"product": {
"name": "openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"product_id": "openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.13.0-202310210425.p0.g27e89a0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"product": {
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.13.0-202310210425.p0.g9183d5c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"product": {
"name": "openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"product_id": "openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel8\u0026tag=v4.13.0-202310210425.p0.gc423635.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"product": {
"name": "openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"product_id": "openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.13.0-202310210425.p0.gc423635.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"product": {
"name": "openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"product_id": "openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.13.0-202310241102.p0.ga1d6dd8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"product": {
"name": "openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"product_id": "openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.13.0-202310210425.p0.g000884f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"product": {
"name": "openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"product_id": "openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.13.0-202310210425.p0.g8db1084.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"product": {
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g8db1084.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"product": {
"name": "openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"product_id": "openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.13.0-202310231526.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"product": {
"name": "openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"product_id": "openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.13.0-202310241102.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"product": {
"name": "openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"product_id": "openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.13.0-202310210425.p0.g79c2147.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"product": {
"name": "openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"product_id": "openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"product": {
"name": "openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"product_id": "openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.13.0-202310210425.p0.g3c223bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"product": {
"name": "openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"product_id": "openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"product": {
"name": "openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"product_id": "openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"product": {
"name": "openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"product_id": "openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"product": {
"name": "openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"product_id": "openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.13.0-202310210425.p0.g860cade.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"product": {
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.13.0-202310210425.p0.g0c90011.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"product": {
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.13.0-202310210425.p0.g645056f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.g5a1cb7d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.13.0-202310210425.p0.g5a1cb7d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"product": {
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.13.0-202310240926.p0.g63d864a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"product": {
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.13.0-202310240926.p0.g9e3cfa4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"product": {
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.13.0-202310210425.p0.g9724dcf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"product": {
"name": "openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"product_id": "openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.13.0-202310210425.p0.g0465934.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"product": {
"name": "openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"product_id": "openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.13.0-202310210425.p0.gb9ba60f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"product": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8\u0026tag=v4.13.0-202310231526.p0.g7ff360a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"product": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.gc7d7f1f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"product": {
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.g0c90011.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"product": {
"name": "openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"product_id": "openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.13.0-202310210425.p0.ga6b24bd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"product": {
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.13.0-202310231526.p0.g84d8626.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"product": {
"name": "openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"product_id": "openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.13.0-202310210425.p0.gd3c8a0d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"product": {
"name": "openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"product_id": "openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.13.0-202310210425.p0.gd3c8a0d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"product": {
"name": "openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"product_id": "openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.13.0-202310241102.p0.g6267b32.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"product": {
"name": "openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"product_id": "openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.13.0-202310241102.p0.g1763e62.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"product": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.13.0-202310210425.p0.gc58c53b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"product": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.13.0-202310210425.p0.gdc186bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"product": {
"name": "openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"product_id": "openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.13.0-202310210425.p0.g1763e62.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"product": {
"name": "openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"product_id": "openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/sriov-cni-rhel9\u0026tag=v4.13.0-202310210425.p0.g5b591b3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"product": {
"name": "openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.13.0-202310210425.p0.gdb24b2a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"product": {
"name": "openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"product_id": "openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.13.0-202310210425.p0.g04f97d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"product": {
"name": "openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"product_id": "openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.13.0-202310210425.p0.g385c421.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"product": {
"name": "openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"product_id": "openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.13.0-202310210425.p0.g04f97d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"product": {
"name": "openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"product_id": "openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.13.0-202310210425.p0.g04f97d5.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x"
},
"product_reference": "openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le"
},
"product_reference": "openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64"
},
"product_reference": "openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64"
},
"product_reference": "openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64"
},
"product_reference": "openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64"
},
"product_reference": "openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64"
},
"product_reference": "openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64"
},
"product_reference": "openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x"
},
"product_reference": "openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le"
},
"product_reference": "openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64"
},
"product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64"
},
"product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x"
},
"product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le"
},
"product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64"
},
"product_reference": "openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le"
},
"product_reference": "openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x"
},
"product_reference": "openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64"
},
"product_reference": "openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64"
},
"product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64"
},
"product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x"
},
"product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le"
},
"product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x"
},
"product_reference": "openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64"
},
"product_reference": "openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le"
},
"product_reference": "openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64"
},
"product_reference": "openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x"
},
"product_reference": "openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le"
},
"product_reference": "openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64"
},
"product_reference": "openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64"
},
"product_reference": "openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64"
},
"product_reference": "openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x"
},
"product_reference": "openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le"
},
"product_reference": "openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64"
},
"product_reference": "openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64"
},
"product_reference": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64"
},
"product_reference": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64"
},
"product_reference": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64"
},
"product_reference": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64"
},
"product_reference": "openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le"
},
"product_reference": "openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64"
},
"product_reference": "openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64"
},
"product_reference": "openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le"
},
"product_reference": "openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64"
},
"product_reference": "openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le"
},
"product_reference": "openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64"
},
"product_reference": "openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x"
},
"product_reference": "openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64"
},
"product_reference": "openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64"
},
"product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64"
},
"product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64"
},
"product_reference": "openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le"
},
"product_reference": "openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x"
},
"product_reference": "openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64"
},
"product_reference": "openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x"
},
"product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le"
},
"product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64"
},
"product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64"
},
"product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64"
},
"product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x"
},
"product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64"
},
"product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le"
},
"product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le"
},
"product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x"
},
"product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64"
},
"product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64"
},
"product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64"
},
"product_reference": "openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x"
},
"product_reference": "openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64"
},
"product_reference": "openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le"
},
"product_reference": "openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64"
},
"product_reference": "openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le"
},
"product_reference": "openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x"
},
"product_reference": "openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64"
},
"product_reference": "openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64"
},
"product_reference": "openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le"
},
"product_reference": "openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x"
},
"product_reference": "openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64"
},
"product_reference": "openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64"
},
"product_reference": "openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le"
},
"product_reference": "openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x"
},
"product_reference": "openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64"
},
"product_reference": "openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64"
},
"product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le"
},
"product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64"
},
"product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64"
},
"product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le"
},
"product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64"
},
"product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64"
},
"product_reference": "openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x"
},
"product_reference": "openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64"
},
"product_reference": "openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le"
},
"product_reference": "openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64"
},
"product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x"
},
"product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64"
},
"product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le"
},
"product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le"
},
"product_reference": "openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64"
},
"product_reference": "openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x"
},
"product_reference": "openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64"
},
"product_reference": "openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64"
},
"product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x"
},
"product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le"
},
"product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64"
},
"product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64"
},
"product_reference": "openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64"
},
"product_reference": "openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le"
},
"product_reference": "openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x"
},
"product_reference": "openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64"
},
"product_reference": "openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le"
},
"product_reference": "openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64"
},
"product_reference": "openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x"
},
"product_reference": "openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x"
},
"product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64"
},
"product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64"
},
"product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le"
},
"product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64"
},
"product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le"
},
"product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x"
},
"product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64"
},
"product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64"
},
"product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le"
},
"product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x"
},
"product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64"
},
"product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64"
},
"product_reference": "openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le"
},
"product_reference": "openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64"
},
"product_reference": "openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64"
},
"product_reference": "openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64"
},
"product_reference": "openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le"
},
"product_reference": "openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64"
},
"product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le"
},
"product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64"
},
"product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64"
},
"product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le"
},
"product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64"
},
"product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64"
},
"product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64"
},
"product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le"
},
"product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64"
},
"product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64"
},
"product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le"
},
"product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64"
},
"product_reference": "openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64"
},
"product_reference": "openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le"
},
"product_reference": "openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le"
},
"product_reference": "openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64"
},
"product_reference": "openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64"
},
"product_reference": "openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le"
},
"product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64"
},
"product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64"
},
"product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x"
},
"product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64"
},
"product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le"
},
"product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64"
},
"product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x"
},
"product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64"
},
"product_reference": "openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64"
},
"product_reference": "openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le"
},
"product_reference": "openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64"
},
"product_reference": "openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le"
},
"product_reference": "openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64"
},
"product_reference": "openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64"
],
"known_not_affected": [
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T12:59:18+00:00",
"details": "For OpenShift Container Platform 4.13 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6129"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T12:59:18+00:00",
"details": "For OpenShift Container Platform 4.13 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6129"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift-tech-preview/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:4c57f4732767082e523289b14aff8b13565e4af01036e1c50f128064fd84adbf_amd64",
"8Base-RHOSE-4.13:openshift4/dpu-network-rhel8-operator@sha256:6d3659fad8fc7f49e44a5d1577789dfb373670fa2fe8ebadc04870a81a04fe53_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:00d2a90cb8ec02add70b819e4521569b80e8778780887f2063c1fdeff05cb3c7_amd64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:0170422d58598b741a42ef990412a5cda856b045176a752b5914fbe025ac17b9_arm64",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:655785d4b563319c3504bc047607d8e51e18b2f40024082e75b60a5212fa7977_s390x",
"8Base-RHOSE-4.13:openshift4/frr-rhel8@sha256:6e8cd5cbac26007bf42c86773b841257be5f533aa0eb501fb4eeef45a0f27363_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:23c2ab3fefc76154846642bc7f687e540a82aa9df7725f590cee4a667f999aee_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:2aea4ffb73a90eaecac491d20cb8b047095c8d80a4826faf4e0db8fc56cfad65_arm64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:ef2fb3e4f30fec8c4e4c186cbcbb49ff7b56d4226d58edbdf15e5642bc434c72_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall-rhel8-operator@sha256:f5cd1f4cbbaae11b48f040e2435fc01d4a66c17bc185b73eb57f5a0ebfc0dd5c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:2bb2a303e2b8543d45a5f5475826c04ce8a6819de5390bc3f8bcc600c07fc71e_amd64",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:84938ed1f7e65a6602eeb6635d438c75c6cb190cd4b0d174129243e917275d44_ppc64le",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:aac652852848988e4f6b2a93e4e167ce03262209e30fdfbcd9e615fb60d1b597_s390x",
"8Base-RHOSE-4.13:openshift4/ingress-node-firewall@sha256:f7c3afb7f1233ff7732febafac2cba8a2092da4e1cb186f9c0c4225df71a7371_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b9c891ea13e156fe5158b9180e2f5579fe8106d5b21cbfa0747587e76ff4d95_amd64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:193af3dfd0ac76f70e4953173eb0d5c509e54d218abae84e9d8d2e3766da239b_arm64",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:810db57ee8a3abaea97e040d1f8f6638633d80e99e521eb63cadee789b034af8_s390x",
"8Base-RHOSE-4.13:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8f6e33f585bb8ae3ca50b0db1c3b9b7a4b37fc761894aec20d9e53f2be2ae77b_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:67a802fa4be2a9d8cfd661d36c8e9f88b07a68f318f2c878b741bae30b78241a_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:c8a44e11f061e541610603bf51b3930d6611ba366768c1f3d8dfecd237cfc97c_amd64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:de57b91ac601a39a99f3f67276f09fc03c19ffb2e8a4c316cd4925628261b566_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8-operator@sha256:ecfafbad777f3c53ed067e3909b6d543d235d660e228e0f9a59ea9b0e8cd3949_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:1ea923a6908e58ba3ca77c2f08cc7a50df4dce9341055f1aa007b5f33a172f00_s390x",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:5ea1a8f197e9c3b8cc11583b49a0c57f5679a57597e689101551d511b1cbd567_ppc64le",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:a1cdafb7a4f5b399ba3a2bbbd97f6ec55fa58d0b0bcff73645a6939710218e79_arm64",
"8Base-RHOSE-4.13:openshift4/metallb-rhel8@sha256:dad9b83e0fb1c1ac802cb2f95932e227467e6cc3c630c569a2f46f2d4c6b8cda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:0a78ecd4cdad87e8a31cfbb2e951e973f052505b86e035b6fec926b26abe8767_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:4ca5fe22a10929b0a4ce6b3f5d22b8ed4e6c7da2e8be4b4a6731db8735a3eb66_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:b9bdd60e2586824a089c06d2e4b376f377625b63db18894b46bad16477bab251_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ansible-operator@sha256:ccd2806a5f1e06ed26cb7e148b8eebbbb1b3f135e1c5432fe1be4eb1bb0a8345_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:4902726608bbf110aceac78d8386a2613ceaff86d0a8f1dc3011afe307d64415_amd64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:ea22e5a0f5f1a7d6da42fedb587c413210b372685c46a577a575d9c1b54de167_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:25a57edcf261d5078c915cd68145a378adb967fe3e7f85518896fa8b3c788063_arm64",
"8Base-RHOSE-4.13:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f4877510f6984358914ec9cde3dce4825ba4bed920e28b94a72daa15875c6c8b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy-rhel8@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:1f0552e4f75903ba5491959f0cb7f61a93c6068113183c1d5b1a14cf6b4dafdb_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:b794c9ca44d41e728cef1600c4385c67bec5455ac1580a247a4d8c2868f7c468_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cloud-event-proxy@sha256:bd81d3742aa3b19363b7b715c86e7f587abd9af2b0b516145b041d9ae553e493_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:37385b219716e2c6a28112622385750d07a2529e438aef0bc0f2d08065fbe67a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:43d462f963db83b18e7123af8af6c43fafc39bd5caca40981208b4c13cf1ca97_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:c38e9343ac169aa7ffcf732b359661a76d23a6104fa2c928704f1d2b6044bb13_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-capacity@sha256:cbe8bd7f34ac3aa47c87dd4e2473077bfd686ae38422144ee88c9cebed8e522e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:110f47992edd56ec24fe067c8d45bd1267d89e57039a221318f8da290131b4c0_arm64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:375a0ec754193142d4ab78d0ea8c4b4815ce6869b05378b4f7dd611dc4b3a93b_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4b828313acd198d2b20c0b56bf2ae2b20c6e0d9352b300a15142b25c79303f22_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:a861507aa4fbf67528ccb1cea0b9e813c07a8529ed7e2d3e6dc0d2da235786a1_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:0af4fd0d72782504a2e62bc0ce9e877c35bacc4b2d99bd8cb17ddc16c4755ee7_amd64",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:12daaed1d90ca668046444bd34f0526b0f6025ceb1c80c8fc72ff33c8d147224_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:d24cc2e52f0410d0f0e92e208a35aa2a0a28c9585b0153a005b92d3164ccd141_s390x",
"8Base-RHOSE-4.13:openshift4/ose-cluster-nfd-operator@sha256:e285b2dcba5f362fbbea4dbf6095bf3d101c69715a4a07251f28b67432f31b89_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:31a9534f3d11283630ffc83b4c8460f6f3d8f8f6b1694019e0c1eb5de455abc7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d130f6fb427deee9d0afef7caa8c1bf038d97fe2eb7741810d68aeeb678a99cc_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d68e358e7779826845424d1b3320e3019bbf8776e9edceba139ab32afc077490_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e9b02218f1b0cf9e9c99bc1deb64ba1337144af832c285c6208c940dc6eaea14_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5986bb8251af335d11c4745d39c9511b21f8dd68c62d7b22b98889054610b39c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:5f9556621dba860b6cc3aadcd29ca3864984aa6f28d5541126214ab1f890066e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:991e6b322f683e04750483abaec501e427534b513fb562a90253280b292d7370_amd64",
"8Base-RHOSE-4.13:openshift4/ose-clusterresourceoverride-rhel8@sha256:9de4e437c8bf883491be7cfc157329f2315e4fd37efe1bff56f9f50c6c8452f7_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0303c44ecef5d2ea83e87b6c1274d4d73dc68203e380e691ee2a0f97b69e1242_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:41c3a01dbfbb7d01b9e9d6defea92e1c92ac6fd38005966249ecc39c632bfa9f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:5fc572219938ed89003e4a21897a448dae71bc410c7fa123754afd8b83d9a429_arm64",
"8Base-RHOSE-4.13:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c4345c6b7089c330348debf5bb87d82cb6cc4f24f56d5ce2a7681de63f0b52c2_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:3ecc0eeec64dba93f317d030b446e2c742518e034b82c555d4a7b997d008a13f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:527e22dbdf9e8195f1f7a481b1ef5135e41610fde5c025b3c48c18d537c7b6c9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:786cab5554b522a05d97b18cbe2749103b39bf309ac37399d1fcf518a02f73f4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-descheduler@sha256:92fdd8f1e3b95565ae598fd32842d0f7b3d32c731873f47774c9d61d379be373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:6e6a079733dc2836180518de07c6996cd10cef4f375b2f43ebf5af9ab51ca25c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:788588e4da19baf7315e1fdc8a2b990b1b089964c3cc5f76e2c03889a0cd142b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:8ba7a8401a376c7aff19662d9b99625d0d7754fe0413c917d523ccc54d81a87e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-dns-proxy@sha256:ad0ae9be4463d99801a778142cc267f40216a13bdc3a04be69dab38d85deafc3_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:51e5ed9f64ce7254360305abe492b85b4ea083cc8dd559e2b5c7a4a09cef8661_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:5a950aca0be41fefab1477a8cd396db312730ffdb6d456d347d4084c07090ca3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:de2886f7fb6e15377067a6677aaa9704944877fbe3b328dd9f91f57bb204fef6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-http-proxy@sha256:e3a2d5a38d5593f7900117781013777f35eff526d566c508211a7f63dc45291d_arm64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:18e7bd90690fb8bd59a58bc585b37030f66452d0bfe73619971feac85486447c_amd64",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:899e8d9922ef9388625db9e2e4856f668b0d4014a6897cc80e5bc4130a66f325_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:d01fa67ae2d284711e39c6eb524ed49119a25d47db78af2e37f351d165b07bf7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-egress-router@sha256:df428c921ae12d030a3ab7fe8508a202d1b1366545aa4705d455396ea5cfc631_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2388004d85a80b5209d4e61696d6f61e9b907fd687ea6b2df0ea891f2c3f87a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:2c5e50e2d27b3264be154a02d1a2334c086280c231de4996dad66cbbf10a4c98_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa4e5b41f60cc33157aa554aec2c81b7495f0d66ec76d90107fec9e039118f00_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:8d775abcce8f3ea93015a34a8c198776ee6d5579531808ded540e36ba388005e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:df7fbde123362168429f59d2064ff50235d242b39db41547117c05814672ac57_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:ebcbeb0ea85ace38326301d82560fa5b41d4ecb8fdd2ddd89646eaef67db1e03_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:3019e28f57bb88d095e0033d1c22c543d4b5a133ce1cf8a50ed94355220284f1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:35a5f927a34d0e90790780047d1b6c12d372acb77a72990d94ce2a84206932f3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:bb7b172916bdf8266e0e9ebba8ffe6a7b5b59fe52dce5badeef7549ea53e7fda_amd64",
"8Base-RHOSE-4.13:openshift4/ose-helm-operator@sha256:f6ff3a2a34d4ea9cdf6bb19ad978d3db8d611d8b045fae12215ca764370835aa_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:49002f025bc069b341c4bba76844db11ac9c963b3669717c81d3a5734c5feae6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5607e281ade26e3b5f63b54323b6c613bd7177d8e62a8923692c5f56d5adb19f_s390x",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7795d7c909c98f3ba635db85c931aaca9856909e9562c4989fd035e408b06cc4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:79757eb52872ded0daee72b36a9e7df618f3db67a43fd37b4039058c09995ec9_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:0943f880a0b6f5f30348da6fb09b75b771bb8b734edd8f554370a94739a28bf0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:2d75f4492de03cd38f86a916c857b3ccfa3bf42ddf3305379ede5c00a6e35640_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:4c45813adbe93ab958fcb5b284dca6be3246d141dc319af32cd3fa6229956cf3_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-diskmaker@sha256:eaf9e9954ebe8db1e0ff118eb27e718d461306f2abd76e964d4141c0a73a5c2f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:36e226018b729d091d18bda697a1f61d07bc0de2d071bc2afc9dc28aeac136c7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3ad9fdceb6a31af84101a83dd09e0125c81a3be4c44e1bee8d9e00ed12e744b9_s390x",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:3b9dec60f12ae6fb249cb48fc5c2e7ea753b6a7de647a42e39fe10af8a5d1d78_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-mustgather-rhel8@sha256:8c787c6916fc351bc9f50eadf71f3fd4e29f01816839fafaf0b0cc2784e2f06b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:05cdaeb001da623de78225705582a2dd849e9f2e18cf11f38fad27b1bd33ccdf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:1bdebfc18def3143aa2fc8e939d718245b2add95a2d796ef87502fa732239259_arm64",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:b318d3db35bc55e1d2f1a48a6bc14fb56fcfb9f03bf85e6af8803928c4f004e2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-local-storage-operator@sha256:f0d80c23dd2eda2eac2f26ad43b028af31e97fd3f4c11e91d465f20fb0c0e51e_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:19e215c87dbcd160906db9518f6994bcfe07ca8fa2b994bde1d34053f44a4d1e_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:517d75599e24165059187f4216c5299d59841359766d929a316d23a2f8b04ee8_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:a0f622158b2810ced7211c40a873901ec3bef0676f3bf482b402dbe621bd3b34_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-feature-discovery@sha256:c8bf2216110c4cf793547ac96f9811c9c3c3622601e33f0feaa45c08e752a0bf_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:18aa7061df5d769b5246c128cc605bfd79fd556c9dcb34800df8dc144d3323cc_s390x",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:56f5288e84ec70e7b15c0d96421954539202b8df353a5b38c0d017e655f60dcf_amd64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:a89bc703dd46910d733946bbee872812a1e6457d3357958e2aef09ee55050a0c_arm64",
"8Base-RHOSE-4.13:openshift4/ose-node-problem-detector-rhel8@sha256:ac23ce0179a7f71f19e56aaa4d7dc48ee26702e9ad2b1055695812dee12c7888_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:5a4c4e5438e76b6373cee7269fdd299654a7def772f1499fc82a734cb722c148_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:61b6d453f5cbb9a51362259f8c4d152bf5474cc2f8e6c8b96cab38e8f163f51c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:8dd8c5c726c4f7db2d64701cad69fbc2629c66a7a02344152264e7783e10932c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:f66d1ea0a1e4416daa31f5bc50c388c95cb018945425f8bda58f6ef975a3b4a1_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:120fd3d63fb4b19fe58d336984869ffba972c3b63513d215bec1efb770aca8ae_arm64",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:2595ab6a45f9e1fc27c48fe9f73a5119e2d40bccd54cdcd14005036af1abd8f6_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:807172a4bdc98fd0fb78ab537ddb55353266396ae9e6746b7e4f7e597fe86ad7_s390x",
"8Base-RHOSE-4.13:openshift4/ose-operator-sdk-rhel8@sha256:f6f195f361335efbcc9f39be7d785c92706676f4b4185464b5f62b9476021bc3_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:06589a4329529a8a3a33cd4fd472e09194e458800d7768c718d92c28b8434380_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:369d5bc04ed6d8aa934813a9695fe7b7f976b8061b1690712bece367b3d0e1ca_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ptp-operator@sha256:8025ab3d5508dc8ef7b70e8601f2faa48890dd1ee98a59d1a50e462c2e334595_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:17f6aa98ce266c4d5f55f4625ab8006aa8ee4eddea63e013da9ce4a844bc9e0f_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:336d32282380765c821f9884f69ab5a3dddf1e860993a7dccdbd61401d5d82d1_amd64",
"8Base-RHOSE-4.13:openshift4/ose-ptp@sha256:b52e23ea264b29101bf9ff5beb093badb6d929a2901a008eb1c6afb8b4a1f21c_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:48a16d032b6934270bc5082132ce61db965089cd449e27017403782d7ee756c4_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:6d0db5138937a9a01a500f73bce00b5a11b3973aef124d713b6d1568bef1e54b_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-dp-admission-controller@sha256:85fceff968dc1b54edabce7a1a1cb04bde91f82302840923c2595d89041f3df7_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:767bf9ece1744ff8a22445f82d1a48d72ad2b6a7588889c9970381fc41f28992_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:8f33db44cfe95dc66ae9aefd391bcf36ad5d9344a9e3f5c1fedaf3ee2c519582_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-infiniband-cni@sha256:ded85ecda6adb848777b08064c5a0ccc63535c1392ab5cdb66eee15200baa32d_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:523d18f994c0dca5d532c257cbd5d18a9888958f745028e0c9ffa0d9f888ee56_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:afbbba806d6f69eda22743d97fc50c15a4dc848ee069d01de62a2f068b5f7f69_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-config-daemon@sha256:f9d94678e2b311441e2e95680c09c7af1515153ae56d94036e937e68fd4aab9a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:90311f2b4238f1d1dd971e147fd0e974c755583ddbd9869aee946edbba750281_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:d207a94593aec1dcf51393db4fd1813e21c7ac9d828631230d9ae2c557336514_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-device-plugin@sha256:fa37c9ce6e017a1c01964fdb25ea08b039aab0d60008fffd7fec3d46e1fbd7e5_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:5eb9a0742bfe48b1e3812d0e6419e9ed84a7aa0e083d91b60e254efe96dfd3e8_arm64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:8da3c47a3c157e390befa1b9e7cd959f2e63a59e95af7ff336f822a37387f147_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-operator@sha256:9464e9e3618c64c8dde89cc6f085b608e0cca8b65784596d16062831a89dbffb_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:33bbf758e6e3ec8e209b78ee8bbf75473c8ccdfddc97aceeb84677db0ca9553f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:a8fdbb8e51c46f6acd0fdeca7a8903e1000af0b2f419ca4ef21157ab89d621aa_amd64",
"8Base-RHOSE-4.13:openshift4/ose-sriov-network-webhook@sha256:c4f26e03c130218c56994a7e564bcd0ba35d7cc1149b1b4dcc3b5c39fc63dbd4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:1dafc844953a5659832b5f70becd865a337602acfd6e75e6bb3b05878ec4849f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:9380b581667dee61ca2895e6e970f01779fc333dbbcd6c98dd305d82cfa1567a_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:be482022b3126bbd7dd0a54e7e33a64075e2a9abf4835ae89932358df2131482_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:c3cb969ccf77d3729507ec8d6fa5d42edaee8e7386690fb827d0a77bc03b5405_s390x",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:0be5e3279676335fff768ad7896f5dd2fd840c7b4f8d0468ea108040e80bbd9b_arm64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:771dcd6f354135b6b682b495443890c55eccfed036e509b35dabb79c273ff260_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:88f8d319b810353f94381d8f3f0c3c72b254e22f209da6af4e23cb46ccd1105a_amd64",
"8Base-RHOSE-4.13:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:d073e7e0ce29e7307e5865b4ccf812d4cf9b5d306b1bae154eb5b5cb886a5905_s390x",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:2ce3cbe42e9f232c15e6e48b36584e79feeada3f9ab7d1b28aa22a805d423ad8_arm64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:9d851e4f3a76fe40c7c504b2676af14cf3016033ad0ff79976e92f0163a8b8c9_amd64",
"8Base-RHOSE-4.13:openshift4/ptp-must-gather-rhel8@sha256:ca96e492869a3c654b09ba879c0b273ae9324089bea02573a3087920a2a0c162_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:9d440268f279fdc21a13184831ae10089eaf14026424e363914484b19680640a_amd64",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:b3b69a08da96296c6a625e2e16522d452b947555bfb1a4067dd57464eb392fbb_ppc64le",
"9Base-RHOSE-4.13:openshift4/sriov-cni-rhel9@sha256:e2dfa33dc5dca27baf5039d02fb06811d2ed50dd0db028620a0887961a29f8d3_arm64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHBA-2024:0599
Vulnerability from csaf_redhat - Published: 2024-01-30 13:46 - Updated: 2026-01-21 10:12Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Migration Toolkit for Applications 7.0.0 release",
"title": "Topic"
},
{
"category": "general",
"text": "Migration Toolkit for Applications 7.0.0 Images",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2024:0599",
"url": "https://access.redhat.com/errata/RHBA-2024:0599"
},
{
"category": "external",
"summary": "MTA-1014",
"url": "https://issues.redhat.com/browse/MTA-1014"
},
{
"category": "external",
"summary": "MTA-1019",
"url": "https://issues.redhat.com/browse/MTA-1019"
},
{
"category": "external",
"summary": "MTA-1024",
"url": "https://issues.redhat.com/browse/MTA-1024"
},
{
"category": "external",
"summary": "MTA-1047",
"url": "https://issues.redhat.com/browse/MTA-1047"
},
{
"category": "external",
"summary": "MTA-1130",
"url": "https://issues.redhat.com/browse/MTA-1130"
},
{
"category": "external",
"summary": "MTA-1155",
"url": "https://issues.redhat.com/browse/MTA-1155"
},
{
"category": "external",
"summary": "MTA-1175",
"url": "https://issues.redhat.com/browse/MTA-1175"
},
{
"category": "external",
"summary": "MTA-1183",
"url": "https://issues.redhat.com/browse/MTA-1183"
},
{
"category": "external",
"summary": "MTA-1185",
"url": "https://issues.redhat.com/browse/MTA-1185"
},
{
"category": "external",
"summary": "MTA-1195",
"url": "https://issues.redhat.com/browse/MTA-1195"
},
{
"category": "external",
"summary": "MTA-1196",
"url": "https://issues.redhat.com/browse/MTA-1196"
},
{
"category": "external",
"summary": "MTA-1197",
"url": "https://issues.redhat.com/browse/MTA-1197"
},
{
"category": "external",
"summary": "MTA-1203",
"url": "https://issues.redhat.com/browse/MTA-1203"
},
{
"category": "external",
"summary": "MTA-1207",
"url": "https://issues.redhat.com/browse/MTA-1207"
},
{
"category": "external",
"summary": "MTA-1247",
"url": "https://issues.redhat.com/browse/MTA-1247"
},
{
"category": "external",
"summary": "MTA-1249",
"url": "https://issues.redhat.com/browse/MTA-1249"
},
{
"category": "external",
"summary": "MTA-1250",
"url": "https://issues.redhat.com/browse/MTA-1250"
},
{
"category": "external",
"summary": "MTA-1251",
"url": "https://issues.redhat.com/browse/MTA-1251"
},
{
"category": "external",
"summary": "MTA-1252",
"url": "https://issues.redhat.com/browse/MTA-1252"
},
{
"category": "external",
"summary": "MTA-1256",
"url": "https://issues.redhat.com/browse/MTA-1256"
},
{
"category": "external",
"summary": "MTA-1258",
"url": "https://issues.redhat.com/browse/MTA-1258"
},
{
"category": "external",
"summary": "MTA-1259",
"url": "https://issues.redhat.com/browse/MTA-1259"
},
{
"category": "external",
"summary": "MTA-1262",
"url": "https://issues.redhat.com/browse/MTA-1262"
},
{
"category": "external",
"summary": "MTA-1263",
"url": "https://issues.redhat.com/browse/MTA-1263"
},
{
"category": "external",
"summary": "MTA-1264",
"url": "https://issues.redhat.com/browse/MTA-1264"
},
{
"category": "external",
"summary": "MTA-1266",
"url": "https://issues.redhat.com/browse/MTA-1266"
},
{
"category": "external",
"summary": "MTA-1268",
"url": "https://issues.redhat.com/browse/MTA-1268"
},
{
"category": "external",
"summary": "MTA-1269",
"url": "https://issues.redhat.com/browse/MTA-1269"
},
{
"category": "external",
"summary": "MTA-1271",
"url": "https://issues.redhat.com/browse/MTA-1271"
},
{
"category": "external",
"summary": "MTA-1279",
"url": "https://issues.redhat.com/browse/MTA-1279"
},
{
"category": "external",
"summary": "MTA-1281",
"url": "https://issues.redhat.com/browse/MTA-1281"
},
{
"category": "external",
"summary": "MTA-1283",
"url": "https://issues.redhat.com/browse/MTA-1283"
},
{
"category": "external",
"summary": "MTA-1284",
"url": "https://issues.redhat.com/browse/MTA-1284"
},
{
"category": "external",
"summary": "MTA-1286",
"url": "https://issues.redhat.com/browse/MTA-1286"
},
{
"category": "external",
"summary": "MTA-1288",
"url": "https://issues.redhat.com/browse/MTA-1288"
},
{
"category": "external",
"summary": "MTA-1292",
"url": "https://issues.redhat.com/browse/MTA-1292"
},
{
"category": "external",
"summary": "MTA-1293",
"url": "https://issues.redhat.com/browse/MTA-1293"
},
{
"category": "external",
"summary": "MTA-1294",
"url": "https://issues.redhat.com/browse/MTA-1294"
},
{
"category": "external",
"summary": "MTA-1295",
"url": "https://issues.redhat.com/browse/MTA-1295"
},
{
"category": "external",
"summary": "MTA-1296",
"url": "https://issues.redhat.com/browse/MTA-1296"
},
{
"category": "external",
"summary": "MTA-1297",
"url": "https://issues.redhat.com/browse/MTA-1297"
},
{
"category": "external",
"summary": "MTA-1298",
"url": "https://issues.redhat.com/browse/MTA-1298"
},
{
"category": "external",
"summary": "MTA-1299",
"url": "https://issues.redhat.com/browse/MTA-1299"
},
{
"category": "external",
"summary": "MTA-1300",
"url": "https://issues.redhat.com/browse/MTA-1300"
},
{
"category": "external",
"summary": "MTA-1302",
"url": "https://issues.redhat.com/browse/MTA-1302"
},
{
"category": "external",
"summary": "MTA-1303",
"url": "https://issues.redhat.com/browse/MTA-1303"
},
{
"category": "external",
"summary": "MTA-1304",
"url": "https://issues.redhat.com/browse/MTA-1304"
},
{
"category": "external",
"summary": "MTA-1305",
"url": "https://issues.redhat.com/browse/MTA-1305"
},
{
"category": "external",
"summary": "MTA-1306",
"url": "https://issues.redhat.com/browse/MTA-1306"
},
{
"category": "external",
"summary": "MTA-1307",
"url": "https://issues.redhat.com/browse/MTA-1307"
},
{
"category": "external",
"summary": "MTA-1309",
"url": "https://issues.redhat.com/browse/MTA-1309"
},
{
"category": "external",
"summary": "MTA-1310",
"url": "https://issues.redhat.com/browse/MTA-1310"
},
{
"category": "external",
"summary": "MTA-1311",
"url": "https://issues.redhat.com/browse/MTA-1311"
},
{
"category": "external",
"summary": "MTA-1312",
"url": "https://issues.redhat.com/browse/MTA-1312"
},
{
"category": "external",
"summary": "MTA-1314",
"url": "https://issues.redhat.com/browse/MTA-1314"
},
{
"category": "external",
"summary": "MTA-1315",
"url": "https://issues.redhat.com/browse/MTA-1315"
},
{
"category": "external",
"summary": "MTA-1316",
"url": "https://issues.redhat.com/browse/MTA-1316"
},
{
"category": "external",
"summary": "MTA-1317",
"url": "https://issues.redhat.com/browse/MTA-1317"
},
{
"category": "external",
"summary": "MTA-1320",
"url": "https://issues.redhat.com/browse/MTA-1320"
},
{
"category": "external",
"summary": "MTA-1322",
"url": "https://issues.redhat.com/browse/MTA-1322"
},
{
"category": "external",
"summary": "MTA-1323",
"url": "https://issues.redhat.com/browse/MTA-1323"
},
{
"category": "external",
"summary": "MTA-1324",
"url": "https://issues.redhat.com/browse/MTA-1324"
},
{
"category": "external",
"summary": "MTA-1326",
"url": "https://issues.redhat.com/browse/MTA-1326"
},
{
"category": "external",
"summary": "MTA-1327",
"url": "https://issues.redhat.com/browse/MTA-1327"
},
{
"category": "external",
"summary": "MTA-1328",
"url": "https://issues.redhat.com/browse/MTA-1328"
},
{
"category": "external",
"summary": "MTA-1329",
"url": "https://issues.redhat.com/browse/MTA-1329"
},
{
"category": "external",
"summary": "MTA-1330",
"url": "https://issues.redhat.com/browse/MTA-1330"
},
{
"category": "external",
"summary": "MTA-1333",
"url": "https://issues.redhat.com/browse/MTA-1333"
},
{
"category": "external",
"summary": "MTA-1334",
"url": "https://issues.redhat.com/browse/MTA-1334"
},
{
"category": "external",
"summary": "MTA-1337",
"url": "https://issues.redhat.com/browse/MTA-1337"
},
{
"category": "external",
"summary": "MTA-1338",
"url": "https://issues.redhat.com/browse/MTA-1338"
},
{
"category": "external",
"summary": "MTA-1339",
"url": "https://issues.redhat.com/browse/MTA-1339"
},
{
"category": "external",
"summary": "MTA-1340",
"url": "https://issues.redhat.com/browse/MTA-1340"
},
{
"category": "external",
"summary": "MTA-1341",
"url": "https://issues.redhat.com/browse/MTA-1341"
},
{
"category": "external",
"summary": "MTA-1343",
"url": "https://issues.redhat.com/browse/MTA-1343"
},
{
"category": "external",
"summary": "MTA-1344",
"url": "https://issues.redhat.com/browse/MTA-1344"
},
{
"category": "external",
"summary": "MTA-1345",
"url": "https://issues.redhat.com/browse/MTA-1345"
},
{
"category": "external",
"summary": "MTA-1346",
"url": "https://issues.redhat.com/browse/MTA-1346"
},
{
"category": "external",
"summary": "MTA-1347",
"url": "https://issues.redhat.com/browse/MTA-1347"
},
{
"category": "external",
"summary": "MTA-1348",
"url": "https://issues.redhat.com/browse/MTA-1348"
},
{
"category": "external",
"summary": "MTA-1349",
"url": "https://issues.redhat.com/browse/MTA-1349"
},
{
"category": "external",
"summary": "MTA-1350",
"url": "https://issues.redhat.com/browse/MTA-1350"
},
{
"category": "external",
"summary": "MTA-1351",
"url": "https://issues.redhat.com/browse/MTA-1351"
},
{
"category": "external",
"summary": "MTA-1362",
"url": "https://issues.redhat.com/browse/MTA-1362"
},
{
"category": "external",
"summary": "MTA-1364",
"url": "https://issues.redhat.com/browse/MTA-1364"
},
{
"category": "external",
"summary": "MTA-1366",
"url": "https://issues.redhat.com/browse/MTA-1366"
},
{
"category": "external",
"summary": "MTA-1367",
"url": "https://issues.redhat.com/browse/MTA-1367"
},
{
"category": "external",
"summary": "MTA-1368",
"url": "https://issues.redhat.com/browse/MTA-1368"
},
{
"category": "external",
"summary": "MTA-1369",
"url": "https://issues.redhat.com/browse/MTA-1369"
},
{
"category": "external",
"summary": "MTA-1377",
"url": "https://issues.redhat.com/browse/MTA-1377"
},
{
"category": "external",
"summary": "MTA-1378",
"url": "https://issues.redhat.com/browse/MTA-1378"
},
{
"category": "external",
"summary": "MTA-1379",
"url": "https://issues.redhat.com/browse/MTA-1379"
},
{
"category": "external",
"summary": "MTA-1381",
"url": "https://issues.redhat.com/browse/MTA-1381"
},
{
"category": "external",
"summary": "MTA-1382",
"url": "https://issues.redhat.com/browse/MTA-1382"
},
{
"category": "external",
"summary": "MTA-1383",
"url": "https://issues.redhat.com/browse/MTA-1383"
},
{
"category": "external",
"summary": "MTA-1384",
"url": "https://issues.redhat.com/browse/MTA-1384"
},
{
"category": "external",
"summary": "MTA-1385",
"url": "https://issues.redhat.com/browse/MTA-1385"
},
{
"category": "external",
"summary": "MTA-1386",
"url": "https://issues.redhat.com/browse/MTA-1386"
},
{
"category": "external",
"summary": "MTA-1387",
"url": "https://issues.redhat.com/browse/MTA-1387"
},
{
"category": "external",
"summary": "MTA-1389",
"url": "https://issues.redhat.com/browse/MTA-1389"
},
{
"category": "external",
"summary": "MTA-1391",
"url": "https://issues.redhat.com/browse/MTA-1391"
},
{
"category": "external",
"summary": "MTA-1393",
"url": "https://issues.redhat.com/browse/MTA-1393"
},
{
"category": "external",
"summary": "MTA-1394",
"url": "https://issues.redhat.com/browse/MTA-1394"
},
{
"category": "external",
"summary": "MTA-1396",
"url": "https://issues.redhat.com/browse/MTA-1396"
},
{
"category": "external",
"summary": "MTA-1397",
"url": "https://issues.redhat.com/browse/MTA-1397"
},
{
"category": "external",
"summary": "MTA-1402",
"url": "https://issues.redhat.com/browse/MTA-1402"
},
{
"category": "external",
"summary": "MTA-1405",
"url": "https://issues.redhat.com/browse/MTA-1405"
},
{
"category": "external",
"summary": "MTA-1407",
"url": "https://issues.redhat.com/browse/MTA-1407"
},
{
"category": "external",
"summary": "MTA-1419",
"url": "https://issues.redhat.com/browse/MTA-1419"
},
{
"category": "external",
"summary": "MTA-1420",
"url": "https://issues.redhat.com/browse/MTA-1420"
},
{
"category": "external",
"summary": "MTA-1422",
"url": "https://issues.redhat.com/browse/MTA-1422"
},
{
"category": "external",
"summary": "MTA-1423",
"url": "https://issues.redhat.com/browse/MTA-1423"
},
{
"category": "external",
"summary": "MTA-1424",
"url": "https://issues.redhat.com/browse/MTA-1424"
},
{
"category": "external",
"summary": "MTA-1425",
"url": "https://issues.redhat.com/browse/MTA-1425"
},
{
"category": "external",
"summary": "MTA-1426",
"url": "https://issues.redhat.com/browse/MTA-1426"
},
{
"category": "external",
"summary": "MTA-1432",
"url": "https://issues.redhat.com/browse/MTA-1432"
},
{
"category": "external",
"summary": "MTA-1434",
"url": "https://issues.redhat.com/browse/MTA-1434"
},
{
"category": "external",
"summary": "MTA-1437",
"url": "https://issues.redhat.com/browse/MTA-1437"
},
{
"category": "external",
"summary": "MTA-1438",
"url": "https://issues.redhat.com/browse/MTA-1438"
},
{
"category": "external",
"summary": "MTA-1449",
"url": "https://issues.redhat.com/browse/MTA-1449"
},
{
"category": "external",
"summary": "MTA-1450",
"url": "https://issues.redhat.com/browse/MTA-1450"
},
{
"category": "external",
"summary": "MTA-1451",
"url": "https://issues.redhat.com/browse/MTA-1451"
},
{
"category": "external",
"summary": "MTA-1452",
"url": "https://issues.redhat.com/browse/MTA-1452"
},
{
"category": "external",
"summary": "MTA-1453",
"url": "https://issues.redhat.com/browse/MTA-1453"
},
{
"category": "external",
"summary": "MTA-1455",
"url": "https://issues.redhat.com/browse/MTA-1455"
},
{
"category": "external",
"summary": "MTA-1456",
"url": "https://issues.redhat.com/browse/MTA-1456"
},
{
"category": "external",
"summary": "MTA-1458",
"url": "https://issues.redhat.com/browse/MTA-1458"
},
{
"category": "external",
"summary": "MTA-1459",
"url": "https://issues.redhat.com/browse/MTA-1459"
},
{
"category": "external",
"summary": "MTA-1465",
"url": "https://issues.redhat.com/browse/MTA-1465"
},
{
"category": "external",
"summary": "MTA-1466",
"url": "https://issues.redhat.com/browse/MTA-1466"
},
{
"category": "external",
"summary": "MTA-1467",
"url": "https://issues.redhat.com/browse/MTA-1467"
},
{
"category": "external",
"summary": "MTA-1476",
"url": "https://issues.redhat.com/browse/MTA-1476"
},
{
"category": "external",
"summary": "MTA-1477",
"url": "https://issues.redhat.com/browse/MTA-1477"
},
{
"category": "external",
"summary": "MTA-1487",
"url": "https://issues.redhat.com/browse/MTA-1487"
},
{
"category": "external",
"summary": "MTA-1489",
"url": "https://issues.redhat.com/browse/MTA-1489"
},
{
"category": "external",
"summary": "MTA-1504",
"url": "https://issues.redhat.com/browse/MTA-1504"
},
{
"category": "external",
"summary": "MTA-1505",
"url": "https://issues.redhat.com/browse/MTA-1505"
},
{
"category": "external",
"summary": "MTA-1506",
"url": "https://issues.redhat.com/browse/MTA-1506"
},
{
"category": "external",
"summary": "MTA-1532",
"url": "https://issues.redhat.com/browse/MTA-1532"
},
{
"category": "external",
"summary": "MTA-1542",
"url": "https://issues.redhat.com/browse/MTA-1542"
},
{
"category": "external",
"summary": "MTA-1543",
"url": "https://issues.redhat.com/browse/MTA-1543"
},
{
"category": "external",
"summary": "MTA-1545",
"url": "https://issues.redhat.com/browse/MTA-1545"
},
{
"category": "external",
"summary": "MTA-1576",
"url": "https://issues.redhat.com/browse/MTA-1576"
},
{
"category": "external",
"summary": "MTA-1584",
"url": "https://issues.redhat.com/browse/MTA-1584"
},
{
"category": "external",
"summary": "MTA-1585",
"url": "https://issues.redhat.com/browse/MTA-1585"
},
{
"category": "external",
"summary": "MTA-1592",
"url": "https://issues.redhat.com/browse/MTA-1592"
},
{
"category": "external",
"summary": "MTA-1598",
"url": "https://issues.redhat.com/browse/MTA-1598"
},
{
"category": "external",
"summary": "MTA-1599",
"url": "https://issues.redhat.com/browse/MTA-1599"
},
{
"category": "external",
"summary": "MTA-1600",
"url": "https://issues.redhat.com/browse/MTA-1600"
},
{
"category": "external",
"summary": "MTA-1605",
"url": "https://issues.redhat.com/browse/MTA-1605"
},
{
"category": "external",
"summary": "MTA-1606",
"url": "https://issues.redhat.com/browse/MTA-1606"
},
{
"category": "external",
"summary": "MTA-1611",
"url": "https://issues.redhat.com/browse/MTA-1611"
},
{
"category": "external",
"summary": "MTA-1621",
"url": "https://issues.redhat.com/browse/MTA-1621"
},
{
"category": "external",
"summary": "MTA-1622",
"url": "https://issues.redhat.com/browse/MTA-1622"
},
{
"category": "external",
"summary": "MTA-1625",
"url": "https://issues.redhat.com/browse/MTA-1625"
},
{
"category": "external",
"summary": "MTA-1627",
"url": "https://issues.redhat.com/browse/MTA-1627"
},
{
"category": "external",
"summary": "MTA-1628",
"url": "https://issues.redhat.com/browse/MTA-1628"
},
{
"category": "external",
"summary": "MTA-1629",
"url": "https://issues.redhat.com/browse/MTA-1629"
},
{
"category": "external",
"summary": "MTA-1640",
"url": "https://issues.redhat.com/browse/MTA-1640"
},
{
"category": "external",
"summary": "MTA-1644",
"url": "https://issues.redhat.com/browse/MTA-1644"
},
{
"category": "external",
"summary": "MTA-1645",
"url": "https://issues.redhat.com/browse/MTA-1645"
},
{
"category": "external",
"summary": "MTA-1647",
"url": "https://issues.redhat.com/browse/MTA-1647"
},
{
"category": "external",
"summary": "MTA-1649",
"url": "https://issues.redhat.com/browse/MTA-1649"
},
{
"category": "external",
"summary": "MTA-1651",
"url": "https://issues.redhat.com/browse/MTA-1651"
},
{
"category": "external",
"summary": "MTA-1654",
"url": "https://issues.redhat.com/browse/MTA-1654"
},
{
"category": "external",
"summary": "MTA-1661",
"url": "https://issues.redhat.com/browse/MTA-1661"
},
{
"category": "external",
"summary": "MTA-1664",
"url": "https://issues.redhat.com/browse/MTA-1664"
},
{
"category": "external",
"summary": "MTA-1673",
"url": "https://issues.redhat.com/browse/MTA-1673"
},
{
"category": "external",
"summary": "MTA-1674",
"url": "https://issues.redhat.com/browse/MTA-1674"
},
{
"category": "external",
"summary": "MTA-1675",
"url": "https://issues.redhat.com/browse/MTA-1675"
},
{
"category": "external",
"summary": "MTA-1676",
"url": "https://issues.redhat.com/browse/MTA-1676"
},
{
"category": "external",
"summary": "MTA-1677",
"url": "https://issues.redhat.com/browse/MTA-1677"
},
{
"category": "external",
"summary": "MTA-1678",
"url": "https://issues.redhat.com/browse/MTA-1678"
},
{
"category": "external",
"summary": "MTA-1679",
"url": "https://issues.redhat.com/browse/MTA-1679"
},
{
"category": "external",
"summary": "MTA-1680",
"url": "https://issues.redhat.com/browse/MTA-1680"
},
{
"category": "external",
"summary": "MTA-1687",
"url": "https://issues.redhat.com/browse/MTA-1687"
},
{
"category": "external",
"summary": "MTA-1693",
"url": "https://issues.redhat.com/browse/MTA-1693"
},
{
"category": "external",
"summary": "MTA-1694",
"url": "https://issues.redhat.com/browse/MTA-1694"
},
{
"category": "external",
"summary": "MTA-1711",
"url": "https://issues.redhat.com/browse/MTA-1711"
},
{
"category": "external",
"summary": "MTA-1714",
"url": "https://issues.redhat.com/browse/MTA-1714"
},
{
"category": "external",
"summary": "MTA-1715",
"url": "https://issues.redhat.com/browse/MTA-1715"
},
{
"category": "external",
"summary": "MTA-1716",
"url": "https://issues.redhat.com/browse/MTA-1716"
},
{
"category": "external",
"summary": "MTA-1717",
"url": "https://issues.redhat.com/browse/MTA-1717"
},
{
"category": "external",
"summary": "MTA-1719",
"url": "https://issues.redhat.com/browse/MTA-1719"
},
{
"category": "external",
"summary": "MTA-1720",
"url": "https://issues.redhat.com/browse/MTA-1720"
},
{
"category": "external",
"summary": "MTA-1722",
"url": "https://issues.redhat.com/browse/MTA-1722"
},
{
"category": "external",
"summary": "MTA-1723",
"url": "https://issues.redhat.com/browse/MTA-1723"
},
{
"category": "external",
"summary": "MTA-1725",
"url": "https://issues.redhat.com/browse/MTA-1725"
},
{
"category": "external",
"summary": "MTA-1739",
"url": "https://issues.redhat.com/browse/MTA-1739"
},
{
"category": "external",
"summary": "MTA-1740",
"url": "https://issues.redhat.com/browse/MTA-1740"
},
{
"category": "external",
"summary": "MTA-1746",
"url": "https://issues.redhat.com/browse/MTA-1746"
},
{
"category": "external",
"summary": "MTA-1747",
"url": "https://issues.redhat.com/browse/MTA-1747"
},
{
"category": "external",
"summary": "MTA-1749",
"url": "https://issues.redhat.com/browse/MTA-1749"
},
{
"category": "external",
"summary": "MTA-1751",
"url": "https://issues.redhat.com/browse/MTA-1751"
},
{
"category": "external",
"summary": "MTA-1752",
"url": "https://issues.redhat.com/browse/MTA-1752"
},
{
"category": "external",
"summary": "MTA-1753",
"url": "https://issues.redhat.com/browse/MTA-1753"
},
{
"category": "external",
"summary": "MTA-1754",
"url": "https://issues.redhat.com/browse/MTA-1754"
},
{
"category": "external",
"summary": "MTA-1762",
"url": "https://issues.redhat.com/browse/MTA-1762"
},
{
"category": "external",
"summary": "MTA-1779",
"url": "https://issues.redhat.com/browse/MTA-1779"
},
{
"category": "external",
"summary": "MTA-1781",
"url": "https://issues.redhat.com/browse/MTA-1781"
},
{
"category": "external",
"summary": "MTA-1783",
"url": "https://issues.redhat.com/browse/MTA-1783"
},
{
"category": "external",
"summary": "MTA-1787",
"url": "https://issues.redhat.com/browse/MTA-1787"
},
{
"category": "external",
"summary": "MTA-1791",
"url": "https://issues.redhat.com/browse/MTA-1791"
},
{
"category": "external",
"summary": "MTA-1804",
"url": "https://issues.redhat.com/browse/MTA-1804"
},
{
"category": "external",
"summary": "MTA-1805",
"url": "https://issues.redhat.com/browse/MTA-1805"
},
{
"category": "external",
"summary": "MTA-1806",
"url": "https://issues.redhat.com/browse/MTA-1806"
},
{
"category": "external",
"summary": "MTA-1810",
"url": "https://issues.redhat.com/browse/MTA-1810"
},
{
"category": "external",
"summary": "MTA-1812",
"url": "https://issues.redhat.com/browse/MTA-1812"
},
{
"category": "external",
"summary": "MTA-1813",
"url": "https://issues.redhat.com/browse/MTA-1813"
},
{
"category": "external",
"summary": "MTA-1815",
"url": "https://issues.redhat.com/browse/MTA-1815"
},
{
"category": "external",
"summary": "MTA-1826",
"url": "https://issues.redhat.com/browse/MTA-1826"
},
{
"category": "external",
"summary": "MTA-1828",
"url": "https://issues.redhat.com/browse/MTA-1828"
},
{
"category": "external",
"summary": "MTA-1834",
"url": "https://issues.redhat.com/browse/MTA-1834"
},
{
"category": "external",
"summary": "MTA-1835",
"url": "https://issues.redhat.com/browse/MTA-1835"
},
{
"category": "external",
"summary": "MTA-1836",
"url": "https://issues.redhat.com/browse/MTA-1836"
},
{
"category": "external",
"summary": "MTA-1839",
"url": "https://issues.redhat.com/browse/MTA-1839"
},
{
"category": "external",
"summary": "MTA-1840",
"url": "https://issues.redhat.com/browse/MTA-1840"
},
{
"category": "external",
"summary": "MTA-1841",
"url": "https://issues.redhat.com/browse/MTA-1841"
},
{
"category": "external",
"summary": "MTA-1842",
"url": "https://issues.redhat.com/browse/MTA-1842"
},
{
"category": "external",
"summary": "MTA-1843",
"url": "https://issues.redhat.com/browse/MTA-1843"
},
{
"category": "external",
"summary": "MTA-1844",
"url": "https://issues.redhat.com/browse/MTA-1844"
},
{
"category": "external",
"summary": "MTA-1846",
"url": "https://issues.redhat.com/browse/MTA-1846"
},
{
"category": "external",
"summary": "MTA-1858",
"url": "https://issues.redhat.com/browse/MTA-1858"
},
{
"category": "external",
"summary": "MTA-1859",
"url": "https://issues.redhat.com/browse/MTA-1859"
},
{
"category": "external",
"summary": "MTA-1860",
"url": "https://issues.redhat.com/browse/MTA-1860"
},
{
"category": "external",
"summary": "MTA-1867",
"url": "https://issues.redhat.com/browse/MTA-1867"
},
{
"category": "external",
"summary": "MTA-1871",
"url": "https://issues.redhat.com/browse/MTA-1871"
},
{
"category": "external",
"summary": "MTA-1878",
"url": "https://issues.redhat.com/browse/MTA-1878"
},
{
"category": "external",
"summary": "MTA-1879",
"url": "https://issues.redhat.com/browse/MTA-1879"
},
{
"category": "external",
"summary": "MTA-1881",
"url": "https://issues.redhat.com/browse/MTA-1881"
},
{
"category": "external",
"summary": "MTA-1882",
"url": "https://issues.redhat.com/browse/MTA-1882"
},
{
"category": "external",
"summary": "MTA-1883",
"url": "https://issues.redhat.com/browse/MTA-1883"
},
{
"category": "external",
"summary": "MTA-1891",
"url": "https://issues.redhat.com/browse/MTA-1891"
},
{
"category": "external",
"summary": "MTA-1892",
"url": "https://issues.redhat.com/browse/MTA-1892"
},
{
"category": "external",
"summary": "MTA-1893",
"url": "https://issues.redhat.com/browse/MTA-1893"
},
{
"category": "external",
"summary": "MTA-1894",
"url": "https://issues.redhat.com/browse/MTA-1894"
},
{
"category": "external",
"summary": "MTA-1895",
"url": "https://issues.redhat.com/browse/MTA-1895"
},
{
"category": "external",
"summary": "MTA-1900",
"url": "https://issues.redhat.com/browse/MTA-1900"
},
{
"category": "external",
"summary": "MTA-1902",
"url": "https://issues.redhat.com/browse/MTA-1902"
},
{
"category": "external",
"summary": "MTA-1903",
"url": "https://issues.redhat.com/browse/MTA-1903"
},
{
"category": "external",
"summary": "MTA-1905",
"url": "https://issues.redhat.com/browse/MTA-1905"
},
{
"category": "external",
"summary": "MTA-1906",
"url": "https://issues.redhat.com/browse/MTA-1906"
},
{
"category": "external",
"summary": "MTA-1907",
"url": "https://issues.redhat.com/browse/MTA-1907"
},
{
"category": "external",
"summary": "MTA-1908",
"url": "https://issues.redhat.com/browse/MTA-1908"
},
{
"category": "external",
"summary": "MTA-1921",
"url": "https://issues.redhat.com/browse/MTA-1921"
},
{
"category": "external",
"summary": "MTA-1935",
"url": "https://issues.redhat.com/browse/MTA-1935"
},
{
"category": "external",
"summary": "MTA-1940",
"url": "https://issues.redhat.com/browse/MTA-1940"
},
{
"category": "external",
"summary": "MTA-1942",
"url": "https://issues.redhat.com/browse/MTA-1942"
},
{
"category": "external",
"summary": "MTA-1945",
"url": "https://issues.redhat.com/browse/MTA-1945"
},
{
"category": "external",
"summary": "MTA-1947",
"url": "https://issues.redhat.com/browse/MTA-1947"
},
{
"category": "external",
"summary": "MTA-1954",
"url": "https://issues.redhat.com/browse/MTA-1954"
},
{
"category": "external",
"summary": "MTA-1957",
"url": "https://issues.redhat.com/browse/MTA-1957"
},
{
"category": "external",
"summary": "MTA-1966",
"url": "https://issues.redhat.com/browse/MTA-1966"
},
{
"category": "external",
"summary": "MTA-1998",
"url": "https://issues.redhat.com/browse/MTA-1998"
},
{
"category": "external",
"summary": "MTA-2009",
"url": "https://issues.redhat.com/browse/MTA-2009"
},
{
"category": "external",
"summary": "MTA-2042",
"url": "https://issues.redhat.com/browse/MTA-2042"
},
{
"category": "external",
"summary": "MTA-2089",
"url": "https://issues.redhat.com/browse/MTA-2089"
},
{
"category": "external",
"summary": "MTA-393",
"url": "https://issues.redhat.com/browse/MTA-393"
},
{
"category": "external",
"summary": "MTA-466",
"url": "https://issues.redhat.com/browse/MTA-466"
},
{
"category": "external",
"summary": "MTA-473",
"url": "https://issues.redhat.com/browse/MTA-473"
},
{
"category": "external",
"summary": "MTA-696",
"url": "https://issues.redhat.com/browse/MTA-696"
},
{
"category": "external",
"summary": "MTA-701",
"url": "https://issues.redhat.com/browse/MTA-701"
},
{
"category": "external",
"summary": "MTA-742",
"url": "https://issues.redhat.com/browse/MTA-742"
},
{
"category": "external",
"summary": "MTA-748",
"url": "https://issues.redhat.com/browse/MTA-748"
},
{
"category": "external",
"summary": "MTA-810",
"url": "https://issues.redhat.com/browse/MTA-810"
},
{
"category": "external",
"summary": "MTA-849",
"url": "https://issues.redhat.com/browse/MTA-849"
},
{
"category": "external",
"summary": "MTA-991",
"url": "https://issues.redhat.com/browse/MTA-991"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhba-2024_0599.json"
}
],
"title": "Red Hat Bug Fix Advisory: Migration Toolkit for Applications bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-01-21T10:12:28+00:00",
"generator": {
"date": "2026-01-21T10:12:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHBA-2024:0599",
"initial_release_date": "2024-01-30T13:46:48+00:00",
"revision_history": [
{
"date": "2024-01-30T13:46:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T13:46:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T10:12:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MTA 7.0 for RHEL 9",
"product": {
"name": "MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el9"
}
}
},
{
"category": "product_name",
"name": "MTA 7.0 for RHEL 8",
"product": {
"name": "MTA 7.0 for RHEL 8",
"product_id": "8Base-MTA-7.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el8"
}
}
}
],
"category": "product_family",
"name": "Migration Toolkit for Applications"
},
{
"branches": [
{
"category": "product_version",
"name": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"product": {
"name": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"product_id": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-addon-rhel9\u0026tag=7.0.0-36"
}
}
},
{
"category": "product_version",
"name": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"product": {
"name": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"product_id": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-lsp-rhel9\u0026tag=7.0.0-22"
}
}
},
{
"category": "product_version",
"name": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
"product": {
"name": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
"product_id": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-cli-rhel9\u0026tag=7.0.0-44"
}
}
},
{
"category": "product_version",
"name": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"product": {
"name": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"product_id": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-hub-rhel9\u0026tag=7.0.0-31"
}
}
},
{
"category": "product_version",
"name": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"product": {
"name": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"product_id": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-operator-bundle\u0026tag=7.0.0-63"
}
}
},
{
"category": "product_version",
"name": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"product": {
"name": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"product_id": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-rhel8-operator\u0026tag=7.0.0-13"
}
}
},
{
"category": "product_version",
"name": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"product": {
"name": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"product_id": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-ui-rhel9\u0026tag=7.0.0-25"
}
}
},
{
"category": "product_version",
"name": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
"product": {
"name": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
"product_id": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-windup-shim-rhel9\u0026tag=7.0.0-31"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64 as a component of MTA 7.0 for RHEL 8",
"product_id": "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64"
},
"product_reference": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"relates_to_product_reference": "8Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64"
},
"product_reference": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64"
},
"product_reference": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
},
"product_reference": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64"
},
"product_reference": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64"
},
"product_reference": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64"
},
"product_reference": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
},
"product_reference": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T13:46:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2024:0599"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T13:46:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2024:0599"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:6022
Vulnerability from csaf_redhat - Published: 2023-10-27 11:58 - Updated: 2026-01-21 05:43Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the varnish:6 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don\u0027t have to create the same web page over and over again, giving the website a significant speed up.\n\nSecurity Fix(es):\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6022",
"url": "https://access.redhat.com/errata/RHSA-2023:6022"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6022.json"
}
],
"title": "Red Hat Security Advisory: varnish:6 security update",
"tracking": {
"current_release_date": "2026-01-21T05:43:04+00:00",
"generator": {
"date": "2026-01-21T05:43:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:6022",
"initial_release_date": "2023-10-27T11:58:40+00:00",
"revision_history": [
{
"date": "2023-10-27T11:58:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-27T11:58:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T05:43:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"product": {
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src (varnish:6)",
"product_id": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish@6.0.2-2.module%2Bel8.2.0%2B20470%2B5fdd0c40.3?arch=src\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"product": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src (varnish:6)",
"product_id": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=src\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"product": {
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6)",
"product_id": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish@6.0.2-2.module%2Bel8.2.0%2B20470%2B5fdd0c40.3?arch=x86_64\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"product": {
"name": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6)",
"product_id": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-devel@6.0.2-2.module%2Bel8.2.0%2B20470%2B5fdd0c40.3?arch=x86_64\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"product": {
"name": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6)",
"product_id": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-docs@6.0.2-2.module%2Bel8.2.0%2B20470%2B5fdd0c40.3?arch=x86_64\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6)",
"product_id": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=x86_64\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product": {
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6)",
"product_id": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debuginfo@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=x86_64\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product": {
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6)",
"product_id": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debugsource@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=x86_64\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"product": {
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le (varnish:6)",
"product_id": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish@6.0.2-2.module%2Bel8.2.0%2B20470%2B5fdd0c40.3?arch=ppc64le\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"product": {
"name": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le (varnish:6)",
"product_id": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-devel@6.0.2-2.module%2Bel8.2.0%2B20470%2B5fdd0c40.3?arch=ppc64le\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"product": {
"name": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le (varnish:6)",
"product_id": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-docs@6.0.2-2.module%2Bel8.2.0%2B20470%2B5fdd0c40.3?arch=ppc64le\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6)",
"product_id": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=ppc64le\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product": {
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6)",
"product_id": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debuginfo@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=ppc64le\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product": {
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6)",
"product_id": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debugsource@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=ppc64le\u0026rpmmod=varnish:6:8020020231019140848:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src (varnish:6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6"
},
"product_reference": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6"
},
"product_reference": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6"
},
"product_reference": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6"
},
"product_reference": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src (varnish:6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6"
},
"product_reference": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6"
},
"product_reference": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6"
},
"product_reference": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6"
},
"product_reference": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6"
},
"product_reference": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6"
},
"product_reference": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6"
},
"product_reference": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6"
},
"product_reference": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6"
},
"product_reference": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src (varnish:6) as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6"
},
"product_reference": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6"
},
"product_reference": "varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6"
},
"product_reference": "varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6"
},
"product_reference": "varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src (varnish:6) as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-27T11:58:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6022"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.AUS:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.2.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.src::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-devel-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-docs-0:6.0.2-2.module+el8.2.0+20470+5fdd0c40.3.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.2.0.Z.TUS:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2024_0269
Vulnerability from csaf_redhat - Published: 2024-02-28 00:20 - Updated: 2024-12-18 05:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for run-once-duration-override-container, run-once-duration-override-operator-bundle-container, and run-once-duration-override-operator-container is now available for RODOO-1.1-RHEL-9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Run Once Duration Override Operator for Red Hat OpenShift is an optional\noperator that makes it possible to override activeDeadlineSecondsOverride\nfield during pod admission.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\n* golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)\n\n* golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0269",
"url": "https://access.redhat.com/errata/RHSA-2024:0269"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "2253193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253193"
},
{
"category": "external",
"summary": "2253330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330"
},
{
"category": "external",
"summary": "OCPBUGS-25123",
"url": "https://issues.redhat.com/browse/OCPBUGS-25123"
},
{
"category": "external",
"summary": "WRKLDS-897",
"url": "https://issues.redhat.com/browse/WRKLDS-897"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0269.json"
}
],
"title": "Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.1.0 for RHEL 9",
"tracking": {
"current_release_date": "2024-12-18T05:01:28+00:00",
"generator": {
"date": "2024-12-18T05:01:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:0269",
"initial_release_date": "2024-02-28T00:20:04+00:00",
"revision_history": [
{
"date": "2024-02-28T00:20:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-02-28T00:20:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T05:01:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RODOO 1.1 for RHEL 9",
"product": {
"name": "RODOO 1.1 for RHEL 9",
"product_id": "9Base-RODOO-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:run_once_duration_override_operator:1.1::el9"
}
}
}
],
"category": "product_family",
"name": "Run Once Duration Override Operator"
},
{
"branches": [
{
"category": "product_version",
"name": "run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64",
"product": {
"name": "run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64",
"product_id": "run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f?arch=amd64\u0026repository_url=registry.redhat.io/run-once-duration-override-operator/run-once-duration-override-rhel9\u0026tag=v1.1-4"
}
}
},
{
"category": "product_version",
"name": "run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"product": {
"name": "run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"product_id": "run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2?arch=amd64\u0026repository_url=registry.redhat.io/run-once-duration-override-operator/run-once-duration-override-operator-bundle\u0026tag=v1.1-4"
}
}
},
{
"category": "product_version",
"name": "run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"product": {
"name": "run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"product_id": "run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a?arch=amd64\u0026repository_url=registry.redhat.io/run-once-duration-override-operator/run-once-duration-override-rhel9-operator\u0026tag=v1.1-5"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64 as a component of RODOO 1.1 for RHEL 9",
"product_id": "9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64"
},
"product_reference": "run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"relates_to_product_reference": "9Base-RODOO-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64 as a component of RODOO 1.1 for RHEL 9",
"product_id": "9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64"
},
"product_reference": "run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"relates_to_product_reference": "9Base-RODOO-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64 as a component of RODOO 1.1 for RHEL 9",
"product_id": "9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
},
"product_reference": "run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64",
"relates_to_product_reference": "9Base-RODOO-1.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-28T00:20:04+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0269"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-39326",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253330"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39326"
},
{
"category": "external",
"summary": "RHBZ#2253330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2382",
"url": "https://pkg.go.dev/vuln/GO-2023-2382"
}
],
"release_date": "2023-12-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-28T00:20:04+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0269"
},
{
"category": "workaround",
"details": "No mitigation is available for this flaw.",
"product_ids": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-28T00:20:04+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0269"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
},
{
"cve": "CVE-2023-45287",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253193"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Golang crypto/tls standard library. In previous versions, the package was vulnerable to a Timing Side Channel attack by observing the time it took for RSA-based TLS key exchanges, which was not constant. This flaw allows a malicious user to gather information from the environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The identified flaw in the Golang crypto/tls library, is assessed as a moderate severity issue rather than important due to several mitigating factors. Although the vulnerability exposes a Timing Side Channel, potentially allowing information retrieval through RSA-based TLS key exchanges, its exploitation demands significant access and expertise. Additionally, while earlier versions implemented RSA blinding to counter timing attacks, the removal of PKCS#1 padding may still leak timing data. However, the practicality of exploiting this flaw is limited, and the transition to a fully constant time RSA implementation in Go 1.20 significantly bolsters security, reducing the risk posed by timing side channels.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45287"
},
{
"category": "external",
"summary": "RHBZ#2253193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45287"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2375",
"url": "https://pkg.go.dev/vuln/GO-2023-2375"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-28T00:20:04+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0269"
},
{
"category": "workaround",
"details": "No current mitigation is available for this vulnerability.",
"product_ids": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:0cf817432277977ae75e28b95be321ff92600fb57f89b54533272657430d16f2_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:4547ff6c810aa975406cf5e510524e657e2465b15344a83bb5e988829526e89a_amd64",
"9Base-RODOO-1.1:run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:46a4a497fe26e9b7f288e82aff25a1af02f40baa97174321ea2f413a1aeb326f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges."
}
]
}
RHSA-2023:7741
Vulnerability from csaf_redhat - Published: 2023-12-12 13:55 - Updated: 2026-01-21 10:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.\n\nThis updated container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux.\n\nSpace precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index\n\nAll users of Red Hat Ceph Storage are advised to pull these new images from the Red Hat Ecosystem catalog.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7741",
"url": "https://access.redhat.com/errata/RHSA-2023:7741"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2181117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181117"
},
{
"category": "external",
"summary": "2186322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186322"
},
{
"category": "external",
"summary": "2210840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210840"
},
{
"category": "external",
"summary": "2210848",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210848"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "2254041",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254041"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7741.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security, enhancements, and bug fix update",
"tracking": {
"current_release_date": "2026-01-21T10:16:38+00:00",
"generator": {
"date": "2026-01-21T10:16:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:7741",
"initial_release_date": "2023-12-12T13:55:37+00:00",
"revision_history": [
{
"date": "2023-12-12T13:55:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-12-12T13:55:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T10:16:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ceph Storage 6.1 Tools",
"product": {
"name": "Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ceph_storage:6.1::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ceph Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"product": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"product_id": "rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9\u0026tag=6-82"
}
}
},
{
"category": "product_version",
"name": "rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"product": {
"name": "rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"product_id": "rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-4"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"product": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"product_id": "rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v2.4.0-12"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"product": {
"name": "rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"product_id": "rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9\u0026tag=6-263"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"product": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"product_id": "rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-5"
}
}
},
{
"category": "product_version",
"name": "rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"product": {
"name": "rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"product_id": "rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-48"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"product": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"product_id": "rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9\u0026tag=6-82"
}
}
},
{
"category": "product_version",
"name": "rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"product": {
"name": "rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"product_id": "rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-4"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"product": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"product_id": "rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v2.4.0-12"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"product": {
"name": "rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"product_id": "rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9\u0026tag=6-263"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"product": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"product_id": "rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-5"
}
}
},
{
"category": "product_version",
"name": "rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64",
"product": {
"name": "rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64",
"product_id": "rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-48"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"product": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"product_id": "rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9\u0026tag=6-82"
}
}
},
{
"category": "product_version",
"name": "rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"product": {
"name": "rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"product_id": "rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-4"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"product": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"product_id": "rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v2.4.0-12"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"product": {
"name": "rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"product_id": "rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9\u0026tag=6-263"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"product": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"product_id": "rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-5"
}
}
},
{
"category": "product_version",
"name": "rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"product": {
"name": "rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"product_id": "rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-48"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64"
},
"product_reference": "rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x"
},
"product_reference": "rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le"
},
"product_reference": "rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x"
},
"product_reference": "rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le"
},
"product_reference": "rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
},
"product_reference": "rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64"
},
"product_reference": "rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le"
},
"product_reference": "rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x"
},
"product_reference": "rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64"
},
"product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x"
},
"product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le"
},
"product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le"
},
"product_reference": "rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x"
},
"product_reference": "rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64"
},
"product_reference": "rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le"
},
"product_reference": "rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x"
},
"product_reference": "rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
},
"product_reference": "rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Grafana Security Team"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2023-1387",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2186322"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Grafana. This flaw allows a remote, authenticated attacker to obtain sensitive information caused by an issue when enabling the \"url_login\" configuration option. By sending a specially crafted request, an attacker can obtain JWT information and use this to launch further attacks against the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grafana: JWT token leak to data source",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"known_not_affected": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1387"
},
{
"category": "external",
"summary": "RHBZ#2186322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186322"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1387"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1387",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1387"
},
{
"category": "external",
"summary": "https://grafana.com/blog/2023/04/26/grafana-security-release-new-versions-of-grafana-with-security-fixes-for-cve-2023-28119-and-cve-2023-1387/",
"url": "https://grafana.com/blog/2023/04/26/grafana-security-release-new-versions-of-grafana-with-security-fixes-for-cve-2023-28119-and-cve-2023-1387/"
},
{
"category": "external",
"summary": "https://grafana.com/security/security-advisories/cve-2023-1387/",
"url": "https://grafana.com/security/security-advisories/cve-2023-1387/"
}
],
"release_date": "2023-04-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-12T13:55:37+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7741"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "grafana: JWT token leak to data source"
},
{
"cve": "CVE-2023-1410",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-03-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2181117"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Grafana. This flaw allows an attacker to host a Graphite instance with modified Function Descriptions containing XSS payloads. When the victim uses it in a query and accidentally hovers over the Function Description, an attacker-controlled XSS payload will be executed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grafana: Stored XSS in Graphite FunctionDescription tooltip",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"known_not_affected": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1410"
},
{
"category": "external",
"summary": "RHBZ#2181117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1410"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1410",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1410"
},
{
"category": "external",
"summary": "https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76",
"url": "https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76"
},
{
"category": "external",
"summary": "https://grafana.com/blog/2023/03/22/grafana-security-release-new-versions-with-security-fixes-for-cve-2023-1410/",
"url": "https://grafana.com/blog/2023/03/22/grafana-security-release-new-versions-with-security-fixes-for-cve-2023-1410/"
}
],
"release_date": "2023-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-12T13:55:37+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7741"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "grafana: Stored XSS in Graphite FunctionDescription tooltip"
},
{
"acknowledgments": [
{
"names": [
"Grafana Security Team"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2023-2183",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2023-05-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2210848"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in grafana. This issue may allow a malicious user to craft a request to the API that enables them to send alert messages via the \"API Alert - Test\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grafana: missing access control allows test alerts by underprivileged user",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) has switched to using upstream rhel rpms for grafana, and is no longer maintaining the servicemesh-grafana package. Hence, it is marked as affected/won\u0027tfix.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"known_not_affected": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2183"
},
{
"category": "external",
"summary": "RHBZ#2210848",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210848"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2183"
},
{
"category": "external",
"summary": "https://grafana.com/security/security-advisories/cve-2023-2183/",
"url": "https://grafana.com/security/security-advisories/cve-2023-2183/"
}
],
"release_date": "2023-06-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-12T13:55:37+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7741"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "grafana: missing access control allows test alerts by underprivileged user"
},
{
"acknowledgments": [
{
"names": [
"Grafana Security Team"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2023-2801",
"cwe": {
"id": "CWE-820",
"name": "Missing Synchronization"
},
"discovery_date": "2023-05-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2210840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in grafana. This issue occurs when sending an API call to the /ds/query or public dashboard query endpoint that has mixed queries, such as having two or more distinct data sources in one API call. As a result, the Grafana instance will crash. Currently, the only feature that uses mixed queries within Grafana is public dashboards, but it is also possible to trigger this issue by calling the API directly.\r\nIf public dashboards are enabled, reproduction requires a public dashboard to be under a heavy load. If public dashboards are disabled, reproduction only occurs when the /ds/query endpoint with a mixed query payload is under a heavy load with a load testing script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grafana: data source proxy race condition",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "- In OpenShift Container Platform (OCP), Red Hat Advanced Cluster Management for Kubernetes (RHACM), and OpenShift ServiceMesh (OSSM) the grafana components are protected by OpenShift OAuth that reduces the impact of this flaw to Moderate.\n- OpenShift ServiceMesh (OSSM) has switched to using upstream rhel rpms for grafana and is no longer maintaining the servicemesh-grafana package. Hence, it is marked as affected/won\u0027tfix.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"known_not_affected": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2801"
},
{
"category": "external",
"summary": "RHBZ#2210840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2801"
},
{
"category": "external",
"summary": "https://grafana.com/security/security-advisories/cve-2023-2801/",
"url": "https://grafana.com/security/security-advisories/cve-2023-2801/"
}
],
"release_date": "2023-06-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-12T13:55:37+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7741"
},
{
"category": "workaround",
"details": "Block mixed query requests and patch to disable mixed query concurrent calls",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "grafana: data source proxy race condition"
},
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"known_not_affected": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-12T13:55:37+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7741"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"known_not_affected": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-12T13:55:37+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7741"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:49e943d69210eb9f4218272f64cc2b9a100bb52416784c417b241c7dcd0eeb23_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:561fba3667ff302316ecef3dc7a80202ec5b854b347e4cbc5d2d4a2ad4419ed3_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:e12cb06f04ac2870d5c387612f4aab65438c4b8044337ab8c55e924dc273ee6b_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:4dc1e2ace5946178fae29c87e2f86467594833e27ddfef8a005273eb9a1bee45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:72ebf29aa3a85cf49949379958744a699e1f572f79abf75e7cb8094ceecf074e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ba574717bd9890dcf1677c9b56d45a2047bb1f6a72a0bb5b8e38c6f3f2db4884_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0809ac10fd225656d8fec0002f71c41f7a07d9c5be0c0affd5740cdae43efcf8_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:6c58ed8e6779027d62bca2dab2de0336ee630257dc903c0ff8069ec986395f47_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:f3eb950ff155132b8d113853d05a917a4e949fa80156bbbdda8e61a5a7d18799_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:04e7e7a046da793f667daa0d1eb8dc90ea984dcd1bdefc8a7b96441a6251b280_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f6ed4e34b8450b5af74cab6bab790013006269cb997883fc50f5c20c1f5dd8d_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:fd567a237640c49c3cb5d392aa995069eb6d7398bffb2fe982f57563b640d630_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:9276234cb0599b75d0adc88c7b1882ff3da6742306a30f26dade3f9bde06ec7e_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:93b546b7d97fd7fdaf9aef486218350817697a6237cbc3ff512eef40ef772a3a_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d6233ee14663867808ca616c9327278af99e0439f0781b548be35e6ab5777de2_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:39e1eb86a6cc6eaa31018a13f86bbb676ec26250d5daf116e3be6d6d194bfe42_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:a47193626427bfe8f686c9f591248d082271c0d20aed96aa268bf7a03b9123d8_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:ca759591794df7f94b67bf798d7d27dd6d2b45d49b8ef8511e2bf51f78672d7e_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:5769
Vulnerability from csaf_redhat - Published: 2023-10-17 09:27 - Updated: 2026-01-21 05:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nghttp2 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "nghttp2 contains the Hypertext Transfer Protocol version 2 (HTTP/2) client, server, and proxy programs as well as a library implementing the HTTP/2 protocol in C.\n\nSecurity Fix(es):\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5769",
"url": "https://access.redhat.com/errata/RHSA-2023:5769"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5769.json"
}
],
"title": "Red Hat Security Advisory: nghttp2 security update",
"tracking": {
"current_release_date": "2026-01-21T05:42:38+00:00",
"generator": {
"date": "2026-01-21T05:42:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:5769",
"initial_release_date": "2023-10-17T09:27:07+00:00",
"revision_history": [
{
"date": "2023-10-17T09:27:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-17T09:27:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T05:42:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"product": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"product_id": "libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.33.0-4.el8_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"product": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"product_id": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-4.el8_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"product": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"product_id": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-4.el8_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"product": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"product_id": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-4.el8_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"product": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"product_id": "libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-4.el8_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"product": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"product_id": "nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.33.0-4.el8_6.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"product": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"product_id": "libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.33.0-4.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"product": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"product_id": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-4.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"product": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"product_id": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-4.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"product": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"product_id": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-4.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"product": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"product_id": "libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-4.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"product": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"product_id": "nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.33.0-4.el8_6.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-0:1.33.0-4.el8_6.1.i686",
"product": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.i686",
"product_id": "libnghttp2-0:1.33.0-4.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.33.0-4.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"product": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"product_id": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-4.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"product": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"product_id": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-4.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"product": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"product_id": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-4.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"product": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"product_id": "libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-4.el8_6.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"product": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"product_id": "libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.33.0-4.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64",
"product": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64",
"product_id": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-4.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"product": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"product_id": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-4.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"product": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"product_id": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-4.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"product": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"product_id": "libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-4.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"product": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"product_id": "nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.33.0-4.el8_6.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"product": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"product_id": "libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.33.0-4.el8_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"product": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"product_id": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-4.el8_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"product": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"product_id": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-4.el8_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"product": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"product_id": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-4.el8_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"product": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"product_id": "libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-4.el8_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.33.0-4.el8_6.1.s390x",
"product": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.s390x",
"product_id": "nghttp2-0:1.33.0-4.el8_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.33.0-4.el8_6.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nghttp2-0:1.33.0-4.el8_6.1.src",
"product": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.src",
"product_id": "nghttp2-0:1.33.0-4.el8_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.33.0-4.el8_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.i686"
},
"product_reference": "libnghttp2-0:1.33.0-4.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686"
},
"product_reference": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.i686"
},
"product_reference": "libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "nghttp2-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.src"
},
"product_reference": "nghttp2-0:1.33.0-4.el8_6.1.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686"
},
"product_reference": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686"
},
"product_reference": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.i686"
},
"product_reference": "libnghttp2-0:1.33.0-4.el8_6.1.i686",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686"
},
"product_reference": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.i686"
},
"product_reference": "libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "nghttp2-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.src"
},
"product_reference": "nghttp2-0:1.33.0-4.el8_6.1.src",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686"
},
"product_reference": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64"
},
"product_reference": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686"
},
"product_reference": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le"
},
"product_reference": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x"
},
"product_reference": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64"
},
"product_reference": "nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.src",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-17T09:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.src",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5769"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.src",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"BaseOS-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:libnghttp2-devel-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.src",
"CRB-8.6.0.Z.EUS:nghttp2-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-4.el8_6.1.x86_64",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.aarch64",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.i686",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.ppc64le",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.s390x",
"CRB-8.6.0.Z.EUS:nghttp2-debugsource-0:1.33.0-4.el8_6.1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_6161
Vulnerability from csaf_redhat - Published: 2023-10-30 02:16 - Updated: 2024-12-18 04:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The Migration Toolkit for Containers (MTC) 1.7.14 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es) from Bugzilla:\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)\n\n* golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)\n\n* golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)\n\n* golang: html/template: improper handling of special tags within script contexts (CVE-2023-39319)\n\n* golang: html/template: improper handling of HTML-like comments within script contexts (CVE-2023-39318)\n\n* golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)\n\n* golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6161",
"url": "https://access.redhat.com/errata/RHSA-2023:6161"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2222167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222167"
},
{
"category": "external",
"summary": "2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "2237773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237773"
},
{
"category": "external",
"summary": "2237776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237776"
},
{
"category": "external",
"summary": "2237777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777"
},
{
"category": "external",
"summary": "2237778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6161.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.14 security and bug fix update",
"tracking": {
"current_release_date": "2024-12-18T04:50:42+00:00",
"generator": {
"date": "2024-12-18T04:50:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:6161",
"initial_release_date": "2023-10-30T02:16:18+00:00",
"revision_history": [
{
"date": "2023-10-30T02:16:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-30T02:16:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T04:50:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "8Base-RHMTC-1.7",
"product": {
"name": "8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhmt:1.7::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Migration Toolkit"
},
{
"branches": [
{
"category": "product_version",
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"product": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.7.14-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"product": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"product_id": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-hook-runner-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"product": {
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"product_id": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-legacy-rhel8-operator\u0026tag=v1.7.14-4"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"product": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"product": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"product": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"product_id": "rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-openvpn-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"product": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"product_id": "rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rhel8-operator\u0026tag=v1.7.14-4"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"product": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"product_id": "rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.7.14-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"product": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"product": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"product": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"product_id": "rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"product_id": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8\u0026tag=v1.7.14-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64",
"product": {
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64",
"product_id": "rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8\u0026tag=v1.7.14-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64"
},
"product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64"
},
"product_reference": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64"
},
"product_reference": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64"
},
"product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64"
},
"product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64"
},
"product_reference": "rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64"
},
"product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64"
},
"product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64"
},
"product_reference": "rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64"
},
"product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64"
},
"product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64 as a component of 8Base-RHMTC-1.7",
"product_id": "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
},
"product_reference": "rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-29406",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2023-07-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2222167"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang, where it is vulnerable to HTTP header injection caused by improper content validation of the Host header by the HTTP/1 client. A remote attacker can inject arbitrary HTTP headers by persuading a victim to visit a specially crafted Web page. This flaw allows the attacker to conduct various attacks against the vulnerable system, including Cross-site scripting, cache poisoning, or session hijacking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: insufficient sanitization of Host header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29406"
},
{
"category": "external",
"summary": "RHBZ#2222167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0",
"url": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0"
}
],
"release_date": "2023-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T02:16:18+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: insufficient sanitization of Host header"
},
{
"cve": "CVE-2023-29409",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-08-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228743"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29409"
},
{
"category": "external",
"summary": "RHBZ#2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409"
},
{
"category": "external",
"summary": "https://go.dev/cl/515257",
"url": "https://go.dev/cl/515257"
},
{
"category": "external",
"summary": "https://go.dev/issue/61460",
"url": "https://go.dev/issue/61460"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ",
"url": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-1987",
"url": "https://pkg.go.dev/vuln/GO-2023-1987"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T02:16:18+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39318",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237776"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not properly handle HMTL-like \"\u003c!--\" and \"--\u003e\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of HTML-like comments within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "RHBZ#2237776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237776"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318"
},
{
"category": "external",
"summary": "https://go.dev/cl/526156",
"url": "https://go.dev/cl/526156"
},
{
"category": "external",
"summary": "https://go.dev/issue/62196",
"url": "https://go.dev/issue/62196"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2041.json",
"url": "https://vuln.go.dev/ID/GO-2023-2041.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T02:16:18+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of HTML-like comments within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39319",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237773"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of special tags within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "RHBZ#2237773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319"
},
{
"category": "external",
"summary": "https://go.dev/cl/526157",
"url": "https://go.dev/cl/526157"
},
{
"category": "external",
"summary": "https://go.dev/issue/62197",
"url": "https://go.dev/issue/62197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2043.json",
"url": "https://vuln.go.dev/ID/GO-2023-2043.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T02:16:18+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of special tags within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Martin Seemann"
]
}
],
"cve": "CVE-2023-39321",
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237777"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "RHBZ#2237777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2044.json",
"url": "https://vuln.go.dev/ID/GO-2023-2044.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T02:16:18+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections"
},
{
"acknowledgments": [
{
"names": [
"Marten Seemann"
]
}
],
"cve": "CVE-2023-39322",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237778"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: lack of a limit on buffered post-handshake",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "RHBZ#2237778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2045.json",
"url": "https://vuln.go.dev/ID/GO-2023-2045.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T02:16:18+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: lack of a limit on buffered post-handshake"
},
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T02:16:18+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6161"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T02:16:18+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6161"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:db6e79aff9c592fe7f27145d01d7444f4dc4e0144cc036ae916d9cf0c95a9cfe_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:c12186c030ce5192c823351ac212c1acf1c85fa574267bc64d2cdf90c5dae87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ce90e9b7af04340afc72f38cfdf5b64d2a6fcae23f59223e2d510c028823d87f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:58f92f50972a948c40319a5c2c9abfe3d44034ba1538f018b51f9998ee875e90_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:cc19dae1824b42b15a8015f6a88f1bc0f85e75a9e7d14f38313a27d93c88f22f_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:79006886844f82db986d9778994727cd40943faa77b2740b54f312fca6602950_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:34e80eefb9b91a41bc4648e02de37d262347085c4da9bd032f43c8bb59e4459a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:4dfa0ace1d92a6ae70d08dc3aff621e5f332956f213db987d9862ed2685e6733_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:0dc885972e7035f2c4b31016f4053e2bd73e328ace6aeee07380db5e0b055b02_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc4a32d349982a82cee52247627f1fd76b6630a6ddb4523a326e83f99d65826d_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:b3fd7bf0c25ecd110635de6e7d071cfe314cbe50ee0f924f3dfa985fd24ae59e_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:c65d0ecc82eb9ebf2256c599b116e5878e57192caca90a83c1035421be914657_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:7ab0d93fe306b1baa0ae64a9c859776109f2cb27a0e468dc1d361e72a99d21b9_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:c89b222e9e9ae02a505fb6986ef1b6ca4b0e15706e3d44d2f03176af7f0d9b6a_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:06010b3b3c7ad25cf0c122cf49bb7795712eebc47936e3c88db46256e93f0843_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:39ac9f6895b2f71cc699c806df204b10af71f18a28de3d3839b7cde6cde13f64_amd64",
"8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:4aefc874e9869305ec80f46548c5499b4887e29135efb9ecad01dfd5a54b31fa_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:5838
Vulnerability from csaf_redhat - Published: 2023-10-18 10:13 - Updated: 2026-01-21 05:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nghttp2 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.\n\nSecurity Fix(es):\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5838",
"url": "https://access.redhat.com/errata/RHSA-2023:5838"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5838.json"
}
],
"title": "Red Hat Security Advisory: nghttp2 security update",
"tracking": {
"current_release_date": "2026-01-21T05:42:43+00:00",
"generator": {
"date": "2026-01-21T05:42:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:5838",
"initial_release_date": "2023-10-18T10:13:32+00:00",
"revision_history": [
{
"date": "2023-10-18T10:13:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-18T10:13:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T05:42:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"product": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"product_id": "libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.43.0-5.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"product": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"product_id": "nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.43.0-5.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"product": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"product_id": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.43.0-5.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"product": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"product_id": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.43.0-5.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"product": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"product_id": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.43.0-5.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"product": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"product_id": "libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.43.0-5.el9_2.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"product": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"product_id": "libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.43.0-5.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"product": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"product_id": "nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.43.0-5.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"product": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"product_id": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.43.0-5.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"product": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"product_id": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.43.0-5.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"product": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"product_id": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.43.0-5.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"product": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"product_id": "libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.43.0-5.el9_2.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"product": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"product_id": "libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.43.0-5.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"product": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"product_id": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.43.0-5.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"product": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"product_id": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.43.0-5.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"product": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"product_id": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.43.0-5.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-0:1.43.0-5.el9_2.1.i686",
"product": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.i686",
"product_id": "libnghttp2-0:1.43.0-5.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.43.0-5.el9_2.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"product": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"product_id": "libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.43.0-5.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"product": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"product_id": "nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.43.0-5.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64",
"product": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64",
"product_id": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.43.0-5.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"product": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"product_id": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.43.0-5.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"product": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"product_id": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.43.0-5.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"product": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"product_id": "libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.43.0-5.el9_2.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"product": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"product_id": "libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.43.0-5.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.43.0-5.el9_2.1.s390x",
"product": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.s390x",
"product_id": "nghttp2-0:1.43.0-5.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.43.0-5.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"product": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"product_id": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.43.0-5.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"product": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"product_id": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.43.0-5.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"product": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"product_id": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.43.0-5.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"product": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"product_id": "libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.43.0-5.el9_2.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nghttp2-0:1.43.0-5.el9_2.1.src",
"product": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.src",
"product_id": "nghttp2-0:1.43.0-5.el9_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.43.0-5.el9_2.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.i686"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.i686"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.src"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_2.1.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.i686"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_2.1.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.i686"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.src"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_2.1.src",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.src",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.src",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-18T10:13:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.src",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.src",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5838"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.src",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.src",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.src",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"BaseOS-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.src",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.i686",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.43.0-5.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_5770
Vulnerability from csaf_redhat - Published: 2023-10-17 09:23 - Updated: 2024-12-17 02:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nghttp2 is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "nghttp2 contains the Hypertext Transfer Protocol version 2 (HTTP/2) client, server, and proxy programs as well as a library implementing the HTTP/2 protocol in C.\n\nSecurity Fix(es):\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5770",
"url": "https://access.redhat.com/errata/RHSA-2023:5770"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5770.json"
}
],
"title": "Red Hat Security Advisory: nghttp2 security update",
"tracking": {
"current_release_date": "2024-12-17T02:37:47+00:00",
"generator": {
"date": "2024-12-17T02:37:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:5770",
"initial_release_date": "2023-10-17T09:23:57+00:00",
"revision_history": [
{
"date": "2023-10-17T09:23:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-17T09:23:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T02:37:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"product": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"product_id": "libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.43.0-5.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"product": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"product_id": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.43.0-5.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"product": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"product_id": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.43.0-5.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"product": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"product_id": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.43.0-5.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"product": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"product_id": "libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.43.0-5.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"product": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"product_id": "nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.43.0-5.el9_0.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"product": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"product_id": "libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.43.0-5.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"product": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"product_id": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.43.0-5.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"product": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"product_id": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.43.0-5.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"product": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"product_id": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.43.0-5.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"product": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"product_id": "libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.43.0-5.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"product": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"product_id": "nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.43.0-5.el9_0.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-0:1.43.0-5.el9_0.2.i686",
"product": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.i686",
"product_id": "libnghttp2-0:1.43.0-5.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.43.0-5.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"product": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"product_id": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.43.0-5.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"product": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"product_id": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.43.0-5.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"product": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"product_id": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.43.0-5.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"product": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"product_id": "libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.43.0-5.el9_0.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"product": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"product_id": "libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.43.0-5.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64",
"product": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64",
"product_id": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.43.0-5.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"product": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"product_id": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.43.0-5.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"product": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"product_id": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.43.0-5.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"product": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"product_id": "libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.43.0-5.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"product": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"product_id": "nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.43.0-5.el9_0.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"product": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"product_id": "libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2@1.43.0-5.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"product": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"product_id": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debugsource@1.43.0-5.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"product": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"product_id": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.43.0-5.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"product": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"product_id": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.43.0-5.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"product": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"product_id": "libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnghttp2-devel@1.43.0-5.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nghttp2-0:1.43.0-5.el9_0.2.s390x",
"product": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.s390x",
"product_id": "nghttp2-0:1.43.0-5.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.43.0-5.el9_0.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nghttp2-0:1.43.0-5.el9_0.2.src",
"product": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.src",
"product_id": "nghttp2-0:1.43.0-5.el9_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nghttp2@1.43.0-5.el9_0.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.i686"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.i686"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.src"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_0.2.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.i686"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_0.2.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.i686"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.src"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_0.2.src",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64"
},
"product_reference": "nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.src",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.src",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-17T09:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.src",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.src",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5770"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.src",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.src",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.src",
"BaseOS-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"BaseOS-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:libnghttp2-devel-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.src",
"CRB-9.0.0.Z.EUS:nghttp2-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-debuginfo-0:1.43.0-5.el9_0.2.x86_64",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.aarch64",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.i686",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.ppc64le",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.s390x",
"CRB-9.0.0.Z.EUS:nghttp2-debugsource-0:1.43.0-5.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:7345
Vulnerability from csaf_redhat - Published: 2023-11-20 08:34 - Updated: 2026-01-21 10:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat OpenShift GitOps 1.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat OpenShift GitOps 1.9.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (Rapid Reset Attack) (CVE-2023-39325)\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nA Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7345",
"url": "https://access.redhat.com/errata/RHSA-2023:7345"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://docs.openshift.com/gitops/1.9/understanding_openshift_gitops/about-redhat-openshift-gitops.html",
"url": "https://docs.openshift.com/gitops/1.9/understanding_openshift_gitops/about-redhat-openshift-gitops.html"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7345.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift GitOps v1.9.3 security update",
"tracking": {
"current_release_date": "2026-01-21T10:16:26+00:00",
"generator": {
"date": "2026-01-21T10:16:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:7345",
"initial_release_date": "2023-11-20T08:34:18+00:00",
"revision_history": [
{
"date": "2023-11-20T08:34:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-20T08:34:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T10:16:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift GitOps 1.9",
"product": {
"name": "Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_gitops:1.9::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift GitOps"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"product": {
"name": "openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"product_id": "openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"product": {
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"product_id": "openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"product": {
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"product_id": "openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/console-plugin-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"product": {
"name": "openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"product_id": "openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"product": {
"name": "openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"product_id": "openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/dex-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"product": {
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64",
"product": {
"name": "openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64",
"product_id": "openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/must-gather-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"product": {
"name": "openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"product_id": "openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-operator-bundle\u0026tag=v1.9.3-6"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"product": {
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.9.3-5"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"product": {
"name": "openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"product_id": "openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"product": {
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"product_id": "openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"product": {
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"product_id": "openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1/console-plugin-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"product": {
"name": "openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"product_id": "openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"product": {
"name": "openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"product_id": "openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1/dex-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x",
"product": {
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x",
"product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"product": {
"name": "openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"product_id": "openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1/must-gather-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"product": {
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.9.3-5"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"product": {
"name": "openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"product_id": "openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"product": {
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"product_id": "openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"product": {
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"product_id": "openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1/console-plugin-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"product": {
"name": "openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"product_id": "openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"product": {
"name": "openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"product_id": "openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1/dex-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"product": {
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"product": {
"name": "openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"product_id": "openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1/must-gather-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"product": {
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.9.3-5"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"product": {
"name": "openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"product_id": "openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argocd-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"product": {
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"product_id": "openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"product": {
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"product_id": "openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1/console-plugin-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"product": {
"name": "openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"product_id": "openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"product": {
"name": "openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"product_id": "openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1/dex-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"product": {
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"product_id": "openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"product": {
"name": "openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"product_id": "openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1/must-gather-rhel8\u0026tag=v1.9.3-5"
}
}
},
{
"category": "product_version",
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"product": {
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"product_id": "openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator\u0026tag=v1.9.3-5"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64"
},
"product_reference": "openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64"
},
"product_reference": "openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le"
},
"product_reference": "openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x"
},
"product_reference": "openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64"
},
"product_reference": "openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le"
},
"product_reference": "openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x"
},
"product_reference": "openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64"
},
"product_reference": "openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le"
},
"product_reference": "openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64"
},
"product_reference": "openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x"
},
"product_reference": "openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64"
},
"product_reference": "openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le"
},
"product_reference": "openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64"
},
"product_reference": "openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x"
},
"product_reference": "openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64"
},
"product_reference": "openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64"
},
"product_reference": "openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x"
},
"product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64"
},
"product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le"
},
"product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64"
},
"product_reference": "openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64"
},
"product_reference": "openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le"
},
"product_reference": "openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x"
},
"product_reference": "openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64"
},
"product_reference": "openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64"
},
"product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le"
},
"product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64"
},
"product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x"
},
"product_reference": "openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x"
},
"product_reference": "openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64"
},
"product_reference": "openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le"
},
"product_reference": "openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"relates_to_product_reference": "8Base-GitOps-1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64 as a component of Red Hat OpenShift GitOps 1.9",
"product_id": "8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64"
},
"product_reference": "openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64",
"relates_to_product_reference": "8Base-GitOps-1.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x"
],
"known_not_affected": [
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-20T08:34:18+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7345"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x"
],
"known_not_affected": [
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-20T08:34:18+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7345"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:08c50b13b7fd04f3756250ce727f75f9d8da1bf0dbb27fd2f1206850d9e7d0fc_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:5dda4516e7dd63cc711cd18e0569cdac873c2a3ae3bf41fd7645384e1aea0952_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:9afedd1e7109a88fbe381846a6a0a206b24ba3e62dd699aa750d4b7f28505080_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argo-rollouts-rhel8@sha256:b830502f20de70c8fc7f77a6c58409c00f6db79224f306f5f667fadfca59bd84_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:bd8aa96326b5c5e649634489941e19bc17cbe04bfeb00d1b362d7afe98277594_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:dd7e218067771217c00df8b4ed7b94faaa70f31596d8a8da796a1115f694fbfc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:e432172e252f278ffe9d1e8bcf6c89c81cbef76e3755eb7b9f3d5ec4622a63e0_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/argocd-rhel8@sha256:fbd5576fa614602b26677e91136d0c9c4722e0eb09672e3784ebdfe71737d3bd_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:21bff8ab1b76db1507a96432d49df4e537ed66d1fed1c96434bde10bfdd62059_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:7c05fd1be9aa7427e565544975f7f85d4600c7eabfd22ff4f07e057e566496eb_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:84dee8a0455dca910bab7407bb8bc3151f788ae991aa9c7d9380e8c7c1a4014c_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/console-plugin-rhel8@sha256:eb9abd40236e7752cd8b5d215ff8619d73e1fd5ff6abd0884409dcd442fb4eaf_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:14b1e455f6ba59777aec0298b64a21cf40d89429dcbc3dd59ad2f30c649d6f5f_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:2c5390ab43937ee0f089f56bd64752aa7d477d713d2eabf17fa7a48b3244e573_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:ae805dd6858d45e042b335240e450c5f5635546381f2cf755b4d0049f80e4bbd_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/dex-rhel8@sha256:f58dc92bdffd95385a51ecdff7677b49cc85b0a7718ca5f69301e6711a9bf04c_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-operator-bundle@sha256:d8725149c57d5de6c5c10d472cfd54721e8f8bf12e66e34c0311103a835a3081_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:02bc04eaa379108c8cf99da5d89a4e8305ccb3c3921037c9b160d639c5c4de03_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:32da9518faee368da0902ba87c1ed95a03e75ea344a31c9af19a96a436a6ddf3_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:79f9227088dee48a79afd14732087c23ea0c6869c0dd167dac94365b225592ec_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8-operator@sha256:d491c7c8525393b4dc8277fae5639ee41ae4d6bbada83a212742e9683877f0b0_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:1e4441c4b21af05b97b4f4d5fdae767721ecc645a43f63611d18d3de87498805_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:21f03d5337d4177a908f63ce3558bc130a045fc45c6f6a4d2783de4e4b555e21_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:585361fa372d675855cb517e0305339f9856fecc7b1f89b31ad33bca3f9836b8_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/gitops-rhel8@sha256:97acdfe9b2fba3a37f01e91efb4074eadcec204414ae7f2c0a426b71af60288c_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:1c546c5cdafd6ca78c3f5cb51d76bdc1c139fdbeee3eae0799a2550920cd31a1_amd64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:6bdef15c447107069382c76cbf89faccbc116ec62c9be9231b0a8edc0e63c0a5_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:9903bb78e5d0cc39d314e9bdaecf902ac4d24bee3f11b7658caaa381253c81c1_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/kam-delivery-rhel8@sha256:b6864990dd11208362570ff7642baf33d96690a9547ddb71403f5deb5578a761_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:399cd150882466cd9e301ea92e899b802980825082c7a5d0a780a81903af0fce_s390x",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:3eb502b1ef4886e5300c5cac0252f9000f1c71bb6c5f1a93758d01d36654be7e_arm64",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:847b14b3fae4d48b588174564b5a17177c141a8d4155442c146f4828642b86cc_ppc64le",
"8Base-GitOps-1.9:openshift-gitops-1/must-gather-rhel8@sha256:b8ff5a1de115b5760c281f59a32831a3a6b949d65a15689d591da6849b297ee9_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_6248
Vulnerability from csaf_redhat - Published: 2023-11-01 14:42 - Updated: 2024-12-18 04:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.12.8 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.12.8 images.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\n* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6248",
"url": "https://access.redhat.com/errata/RHSA-2023:6248"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2178358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6248.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.12.8 Images security update",
"tracking": {
"current_release_date": "2024-12-18T04:53:04+00:00",
"generator": {
"date": "2024-12-18T04:53:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:6248",
"initial_release_date": "2023-11-01T14:42:20+00:00",
"revision_history": [
{
"date": "2023-11-01T14:42:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-01T14:42:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T04:53:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.12 for RHEL 8",
"product": {
"name": "CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.12::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"product": {
"name": "container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"product_id": "container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"product": {
"name": "container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"product": {
"name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"product": {
"name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"product": {
"name": "container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"product_id": "container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.12.8-17"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"product": {
"name": "container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"product_id": "container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver\u0026tag=v4.12.8-4"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.12.8-4"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.12.8-4"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.12.8-4"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.12.8-4"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"product": {
"name": "container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"product_id": "container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"product_id": "container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.12.8-4"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator\u0026tag=v4.12.8-4"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"product_id": "container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.12.8-4"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"product": {
"name": "container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"product_id": "container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"product_identification_helper": {
"purl": "pkg:oci/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"product": {
"name": "container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"product_id": "container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"product": {
"name": "container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"product_id": "container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"product": {
"name": "container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"product_id": "container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"product": {
"name": "container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"product_id": "container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"product_id": "container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"product_id": "container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"product_id": "container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"product_id": "container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.12.8-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"product": {
"name": "container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"product_id": "container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"product": {
"name": "container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"product_id": "container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"product": {
"name": "container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"product_id": "container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"product": {
"name": "container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"product_id": "container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"product": {
"name": "container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"product_id": "container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.12.8-2"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"product": {
"name": "container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"product_id": "container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"product": {
"name": "container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"product_id": "container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.12.8-5"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64",
"product": {
"name": "container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64",
"product_id": "container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup\u0026tag=v4.12.8-4"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64"
},
"product_reference": "container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64"
},
"product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64"
},
"product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64"
},
"product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64"
},
"product_reference": "container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64"
},
"product_reference": "container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64"
},
"product_reference": "container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64"
},
"product_reference": "container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64"
},
"product_reference": "container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64"
},
"product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64"
},
"product_reference": "container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64"
},
"product_reference": "container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64"
},
"product_reference": "container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64"
},
"product_reference": "container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64"
},
"product_reference": "container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64"
},
"product_reference": "container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64"
},
"product_reference": "container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64"
},
"product_reference": "container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64"
},
"product_reference": "container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64 as a component of CNV 4.12 for RHEL 8",
"product_id": "8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
},
"product_reference": "container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64",
"relates_to_product_reference": "8Base-CNV-4.12"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Philippe Antoine"
],
"organization": "Catena Cyber"
}
],
"cve": "CVE-2022-41723",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-03-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2178358"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within OpenShift Container Platform, the maximum impact of this vulnerability is a denial of service against an individual container so the impact could not cascade across the entire infrastructure, this vulnerability is rated Moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64"
],
"known_not_affected": [
"8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41723"
},
{
"category": "external",
"summary": "RHBZ#2178358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h",
"url": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h"
},
{
"category": "external",
"summary": "https://go.dev/cl/468135",
"url": "https://go.dev/cl/468135"
},
{
"category": "external",
"summary": "https://go.dev/cl/468295",
"url": "https://go.dev/cl/468295"
},
{
"category": "external",
"summary": "https://go.dev/issue/57855",
"url": "https://go.dev/issue/57855"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E",
"url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-1571",
"url": "https://pkg.go.dev/vuln/GO-2023-1571"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-1571.json",
"url": "https://vuln.go.dev/ID/GO-2023-1571.json"
}
],
"release_date": "2023-02-17T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-01T14:42:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6248"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding"
},
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
],
"known_not_affected": [
"8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-01T14:42:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6248"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64"
],
"known_not_affected": [
"8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-01T14:42:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6248"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:23d0f2055443e81079ef82573ff23539ff03bc0a57912638b80fdf24d6e74b4f_amd64",
"8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:c9106a0cdf723043ad2e94fe746d084ffb4cdf50292763922389acafb6d1abf7_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:b60bc0fd0988c23c1224280c9b63e98d5b77998f0ed24e12a55158da8971ae4d_amd64",
"8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:74ff80f2d32a0d1dd58c7ac63cc2c5792146e3bc2a65b57727e172e0da8ed994_amd64",
"8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:dddf77c42a60a2837388448d294a65719281984009708a1d90ce328c3d95aa28_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:6b9c72bfb44b3ed66ffbe7785bfa44d81bed9b5c802e8f664d5bd129789a108a_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:97a53da9d0aa186d8120558b071c8a609db2e9fdf55e88780c4df4a96d1e7fb9_amd64",
"8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:a6c27e3bdbf23952f0eacb1be73c14eabb02b9e6ed12ac2f1fa3f386de11ed8c_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:5fbe17bcbbf20acae781c4fbdde81d1d53469f276b217a9a0339baae8c28a442_amd64",
"8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:3b73aae81279eb9fc9354a141230a2ae2ffaf767ec430653ceef9e8a6f5b2578_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:a63b4835f1e1afc3d5da3b80526e494ace5fe6917a51526648b9b1228168f552_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:861fb3b8d3b009f5dda71338f5dc340081e4501cc38af55c8d03a1c00378c6a3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:8218a9b29aaa5bdcddc4b67256c802fc555fc2b96fc2045671d9a62faa0517e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:a530fcc39c11350dabf592c52288a44521f639a91716afe40c31f676a0287eb2_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:b9f5f854305f631dd893995365e92ecb6a20085c84cab124bd5a1f715bbf110b_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:1fbad55cf897a63ba992609d0b966d1a15ea33c65772a89d3ed03cc565c88ff3_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:420a2f4a5ccf17d354945725efd872ce48042afb02f9446348d95086f6c074e6_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:aa24caef43563243aa45e2146a9be4ebe15a55e7d47cd043d0a2e1094d4662bb_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:0cb042eb4f9f6c8d1436d010eb9691ceb5c02f0f273ae458780ad92727f45908_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:6337cb6e7978d8622f6948f81bd927ba97265baaedf3c527bf2b0bc9d33fd7af_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:108b0a434e22eb7837b225f711d63303a08193d8af3883522c992d6486c26353_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:4b393bbab7a0da4574a285ec365da0559e137e55c28b88ec9f4c7b75a0bde133_amd64",
"8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:053df4781a11f4353e06fcc7b12e8fb81a52b7bccab5f8a6c98f56947d05c270_amd64",
"8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:9b0649921289b2484e05760c81890262cae75d9cbac2764ec258b57fa3b7e605_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:43a216c37d6ff86c2ac963f64022e1b4c475a64cb681bb504879caf70f8688df_amd64",
"8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:dc55c6e82516b8fc6b80b858cc9c308384998b8bb578252ca25e919e3fcf7c08_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:8a8079e2bed79b5d18796db8ba44d56610b68544974e55c851b0116997b82414_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:383022adea0838abf0e7394b95059b995e616427eed4fff1e65d125c14c0a7e5_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:10c4bb9ad748bac9b04ef16f542941a67a4c78d8dd4069c8f5cbade859ae3dba_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:fba428882b1637778d373ebd4c86842235fad5115334110e5d41514ccfde64c6_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:97208eac253cb235dd67214dc6e8bdc5335f438250b662c4ba30fb6735ea6ecb_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:7296bc1fc028558ad2c011b3a4ea66e2f058c2d0c0ca128703699ea40ad12ac2_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:8c17826aa039376a4a50f9a2db48b3f2797b14b915aa069826f4278182fb5e22_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:c980ef56b6e73b9f7e76b05b61a245d891465c3ce6a779591ef9bffa79aaa2f8_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:42e669ed714ce412b299d52edf016d478c715127916846265cc48342d9e9fcb4_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:c7ef9a1f3dcd6ba257b3f6a5431cf8cce5809a4b76fa14523c65b45af995bc40_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:4b4fe7649612d6230cac655ae7ca5e2c4b2817911bdac9d9b1d53b233d7a4a72_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:13a1fd0199c6af5555c7a357f495b160304a67fc680dc57fde1dea98a6a08e67_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:cc93189523fcc3eb3f023a576eb9501234d5d862fb91136ae16e631b0abcbe29_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:d58d3f87c690066148fd32f4549b1df516a4085bf6bdb8de4abcd033047cf6a0_amd64",
"8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:c2daeb82867dd85031ec6bb2251f9ba7e6a3961ad89c59d96c4d223e7856824c_amd64",
"8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:da501d80839308b9603eaf8fdc99cdb8f67a4c25e67b3897a162b54e7d113826_amd64",
"8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f33051f5c6ac1c7f3098e48b5388fde6c11830136641802d77a8e433cfd942fa_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:6023
Vulnerability from csaf_redhat - Published: 2023-10-23 12:00 - Updated: 2026-01-21 05:43Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the varnish:6 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don\u0027t have to create the same web page over and over again, giving the website a significant speed up.\n\nSecurity Fix(es):\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6023",
"url": "https://access.redhat.com/errata/RHSA-2023:6023"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6023.json"
}
],
"title": "Red Hat Security Advisory: varnish:6 security update",
"tracking": {
"current_release_date": "2026-01-21T05:43:05+00:00",
"generator": {
"date": "2026-01-21T05:43:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:6023",
"initial_release_date": "2023-10-23T12:00:32+00:00",
"revision_history": [
{
"date": "2023-10-23T12:00:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-23T12:00:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T05:43:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.src::varnish:6",
"product": {
"name": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.src (varnish:6)",
"product_id": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.src::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish@6.0.2-2.module%2Bel8.1.0%2B20476%2B646a44ec.3?arch=src\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"product": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src (varnish:6)",
"product_id": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=src\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"product": {
"name": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le (varnish:6)",
"product_id": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish@6.0.2-2.module%2Bel8.1.0%2B20476%2B646a44ec.3?arch=ppc64le\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"product": {
"name": "varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le (varnish:6)",
"product_id": "varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-devel@6.0.2-2.module%2Bel8.1.0%2B20476%2B646a44ec.3?arch=ppc64le\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"product": {
"name": "varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le (varnish:6)",
"product_id": "varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-docs@6.0.2-2.module%2Bel8.1.0%2B20476%2B646a44ec.3?arch=ppc64le\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6)",
"product_id": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=ppc64le\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product": {
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6)",
"product_id": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debuginfo@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=ppc64le\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product": {
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6)",
"product_id": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debugsource@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=ppc64le\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"product": {
"name": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64 (varnish:6)",
"product_id": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish@6.0.2-2.module%2Bel8.1.0%2B20476%2B646a44ec.3?arch=x86_64\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"product": {
"name": "varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64 (varnish:6)",
"product_id": "varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-devel@6.0.2-2.module%2Bel8.1.0%2B20476%2B646a44ec.3?arch=x86_64\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"product": {
"name": "varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64 (varnish:6)",
"product_id": "varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-docs@6.0.2-2.module%2Bel8.1.0%2B20476%2B646a44ec.3?arch=x86_64\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6)",
"product_id": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=x86_64\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product": {
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6)",
"product_id": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debuginfo@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=x86_64\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product": {
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6)",
"product_id": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debugsource@0.15.0-4.module%2Bel8%2B2481%2B4078e9d2?arch=x86_64\u0026rpmmod=varnish:6:8010020231019161354:c27ad7f8"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6"
},
"product_reference": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.src (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.src::varnish:6"
},
"product_reference": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.src::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6"
},
"product_reference": "varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6"
},
"product_reference": "varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6"
},
"product_reference": "varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6"
},
"product_reference": "varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6"
},
"product_reference": "varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6"
},
"product_reference": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6"
},
"product_reference": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
},
"product_reference": "varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.src::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-23T12:00:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.src::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6023"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.src::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.src::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-devel-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-docs-0:6.0.2-2.module+el8.1.0+20476+646a44ec.3.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.src::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debuginfo-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.ppc64le::varnish:6",
"AppStream-8.1.0.Z.E4S:varnish-modules-debugsource-0:0.15.0-4.module+el8+2481+4078e9d2.x86_64::varnish:6"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:6145
Vulnerability from csaf_redhat - Published: 2023-10-26 18:17 - Updated: 2026-01-21 10:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multicluster Engine for Kubernetes 2.2.9 General Availability release images, \nwhich contain security updates and fix bugs.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Multicluster Engine for Kubernetes 2.2.9 images\n\nMulticluster engine for Kubernetes provides the foundational components\nthat are necessary for the centralized management of multiple\nKubernetes-based clusters across data centers, public clouds, and private\nclouds.\n\nYou can use the engine to create new Red Hat OpenShift Container Platform\nclusters or to bring existing Kubernetes-based clusters under management by\nimporting them. After the clusters are managed, you can use the APIs that\nare provided by the engine to distribute configuration based on placement\npolicy.\n\nSecurity fix(es):\nCVE-2023-44487 HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack\nCVE-2023-39325 golang: net/http, x/net/http2: rapid stream resets can cause excessive work\nCVE-2023-39321 golang: crypto/tls: panic when processing post-handshake message on QUIC connections\nCVE-2023-39319 golang: html/template: improper handling of special tags within script contexts\nCVE-2023-39318 golang: html/template: improper handling of HTML-like comments within script contexts\nCVE-2023-39322 golang: crypto/tls: lack of a limit on buffered post-handshake",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6145",
"url": "https://access.redhat.com/errata/RHSA-2023:6145"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2237773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237773"
},
{
"category": "external",
"summary": "2237776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237776"
},
{
"category": "external",
"summary": "2237777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777"
},
{
"category": "external",
"summary": "2237778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6145.json"
}
],
"title": "Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.2.9 security updates and bug fixes",
"tracking": {
"current_release_date": "2026-01-21T10:15:53+00:00",
"generator": {
"date": "2026-01-21T10:15:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:6145",
"initial_release_date": "2023-10-26T18:17:34+00:00",
"revision_history": [
{
"date": "2023-10-26T18:17:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-26T18:17:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T10:15:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "multicluster engine for Kubernetes 2.2 for RHEL 8",
"product": {
"name": "multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:multicluster_engine:2.2::el8"
}
}
}
],
"category": "product_family",
"name": "multicluster engine for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"product": {
"name": "multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"product_id": "multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"product": {
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"product": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"product": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"product_id": "multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"product": {
"name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"product_id": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-reporter-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"product": {
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"product": {
"name": "multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"product_id": "multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"product": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"product": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"product": {
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"product": {
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"product": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"product": {
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"product": {
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"product": {
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"product_id": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"product": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"product": {
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"product_id": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"product": {
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"product_id": "multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"product": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.2.9-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"product": {
"name": "multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"product_id": "multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.2.9-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"product": {
"name": "multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"product_id": "multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"product": {
"name": "multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"product_id": "multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.2.9-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"product": {
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"product": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"product": {
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"product_id": "multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-cli-rhel8\u0026tag=v2.2.9-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"product": {
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"product": {
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"product": {
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"product": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"product": {
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"product": {
"name": "multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"product_id": "multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"product": {
"name": "multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"product_id": "multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.2.9-10"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"product": {
"name": "multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"product_id": "multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"product": {
"name": "multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"product_id": "multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"product": {
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"product": {
"name": "multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"product_id": "multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"product": {
"name": "multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"product_id": "multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le",
"product": {
"name": "multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le",
"product_id": "multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.2.9-3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"product": {
"name": "multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"product_id": "multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"product": {
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"product_identification_helper": {
"purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"product": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"product": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"product_id": "multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-agent-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"product": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"product_id": "multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"product": {
"name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"product_id": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-reporter-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"product": {
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"product": {
"name": "multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"product_id": "multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"product": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"product": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"product": {
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"product": {
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"product": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"product": {
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"product": {
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"product": {
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"product_id": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"product": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"product": {
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"product_id": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"product": {
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"product_id": "multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"product": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.2.9-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"product": {
"name": "multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"product_id": "multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.2.9-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"product": {
"name": "multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"product_id": "multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"product": {
"name": "multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"product_id": "multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.2.9-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"product": {
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"product": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"product": {
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"product_id": "multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-cli-rhel8\u0026tag=v2.2.9-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"product": {
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"product": {
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"product": {
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"product": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"product": {
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"product": {
"name": "multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"product_id": "multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"product": {
"name": "multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"product_id": "multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"product": {
"name": "multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"product_id": "multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"product": {
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"product": {
"name": "multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"product_id": "multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"product": {
"name": "multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"product_id": "multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"product": {
"name": "multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"product_id": "multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.2.9-3"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"product": {
"name": "multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"product_id": "multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"product_identification_helper": {
"purl": "pkg:oci/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"product": {
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"product_identification_helper": {
"purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"product": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"product": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"product_id": "multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-agent-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"product": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"product_id": "multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"product": {
"name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"product_id": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-reporter-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"product": {
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"product": {
"name": "multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"product_id": "multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"product": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"product": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"product": {
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"product": {
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"product": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"product": {
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"product": {
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"product": {
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"product_id": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"product": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"product": {
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"product_id": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"product": {
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"product_id": "multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"product": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.2.9-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"product": {
"name": "multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"product_id": "multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.2.9-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"product": {
"name": "multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"product_id": "multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"product": {
"name": "multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"product_id": "multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.2.9-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"product": {
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"product": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"product": {
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"product_id": "multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-cli-rhel8\u0026tag=v2.2.9-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"product": {
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"product": {
"name": "multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"product_id": "multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"product_identification_helper": {
"purl": "pkg:oci/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/klusterlet-operator-bundle\u0026tag=v2.2.9-4"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"product": {
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"product": {
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"product": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"product": {
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"product": {
"name": "multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"product_id": "multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"product": {
"name": "multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"product_id": "multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.2.9-10"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"product": {
"name": "multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"product_id": "multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"product": {
"name": "multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"product_id": "multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"product": {
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"product": {
"name": "multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"product_id": "multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"product": {
"name": "multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"product_id": "multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"product": {
"name": "multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"product_id": "multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.2.9-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"product": {
"name": "multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"product_id": "multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"product": {
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"product": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"product": {
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"product": {
"name": "multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"product_id": "multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"product": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"product": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"product": {
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"product": {
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"product": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"product": {
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"product": {
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"product": {
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"product_id": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"product": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"product": {
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"product_id": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"product": {
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"product_id": "multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"product": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.2.9-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"product": {
"name": "multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"product_id": "multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.2.9-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"product": {
"name": "multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"product_id": "multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"product": {
"name": "multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"product_id": "multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.2.9-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"product": {
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"product": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"product": {
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"product_id": "multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-cli-rhel8\u0026tag=v2.2.9-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"product": {
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"product": {
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"product": {
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"product": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"product": {
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"product": {
"name": "multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"product_id": "multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"product": {
"name": "multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"product_id": "multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.2.9-10"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"product": {
"name": "multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"product_id": "multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.2.9-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"product": {
"name": "multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"product_id": "multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"product": {
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"product": {
"name": "multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"product_id": "multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"product": {
"name": "multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"product_id": "multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.2.9-3"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"product": {
"name": "multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"product_id": "multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.2.9-3"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le"
},
"product_reference": "multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64"
},
"product_reference": "multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64"
},
"product_reference": "multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x"
},
"product_reference": "multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64"
},
"product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x"
},
"product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64"
},
"product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le"
},
"product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le"
},
"product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x"
},
"product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64"
},
"product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64"
},
"product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64"
},
"product_reference": "multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64"
},
"product_reference": "multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le"
},
"product_reference": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64"
},
"product_reference": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64"
},
"product_reference": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64"
},
"product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64"
},
"product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le"
},
"product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64"
},
"product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64"
},
"product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x"
},
"product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le"
},
"product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le"
},
"product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x"
},
"product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64"
},
"product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64"
},
"product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64"
},
"product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x"
},
"product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64"
},
"product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le"
},
"product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64"
},
"product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le"
},
"product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x"
},
"product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64"
},
"product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le"
},
"product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64"
},
"product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64"
},
"product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x"
},
"product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64"
},
"product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x"
},
"product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64"
},
"product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le"
},
"product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le"
},
"product_reference": "multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64"
},
"product_reference": "multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64"
},
"product_reference": "multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x"
},
"product_reference": "multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64"
},
"product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64"
},
"product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le"
},
"product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x"
},
"product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64"
},
"product_reference": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64"
},
"product_reference": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le"
},
"product_reference": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x"
},
"product_reference": "multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64"
},
"product_reference": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x"
},
"product_reference": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64"
},
"product_reference": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le"
},
"product_reference": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le"
},
"product_reference": "multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64"
},
"product_reference": "multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x"
},
"product_reference": "multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64"
},
"product_reference": "multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64"
},
"product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x"
},
"product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64"
},
"product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le"
},
"product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64"
},
"product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x"
},
"product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le"
},
"product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64"
},
"product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64"
},
"product_reference": "multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64"
},
"product_reference": "multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le"
},
"product_reference": "multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x"
},
"product_reference": "multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64"
},
"product_reference": "multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64"
},
"product_reference": "multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le"
},
"product_reference": "multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x"
},
"product_reference": "multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le"
},
"product_reference": "multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x"
},
"product_reference": "multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64"
},
"product_reference": "multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64"
},
"product_reference": "multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x"
},
"product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64"
},
"product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64"
},
"product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le"
},
"product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le"
},
"product_reference": "multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x"
},
"product_reference": "multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64"
},
"product_reference": "multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64"
},
"product_reference": "multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64"
},
"product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le"
},
"product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x"
},
"product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64"
},
"product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64"
},
"product_reference": "multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x"
},
"product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le"
},
"product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64"
},
"product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64"
},
"product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64"
},
"product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x"
},
"product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le"
},
"product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64"
},
"product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x"
},
"product_reference": "multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64"
},
"product_reference": "multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
},
"product_reference": "multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le"
},
"product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64"
},
"product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64"
},
"product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x"
},
"product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64"
},
"product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x"
},
"product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64"
},
"product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le"
},
"product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64"
},
"product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64"
},
"product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le"
},
"product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x"
},
"product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x"
},
"product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64"
},
"product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64"
},
"product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le"
},
"product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x"
},
"product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le"
},
"product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64"
},
"product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64"
},
"product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64"
},
"product_reference": "multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x"
},
"product_reference": "multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64"
},
"product_reference": "multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le"
},
"product_reference": "multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64"
},
"product_reference": "multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le"
},
"product_reference": "multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x"
},
"product_reference": "multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64"
},
"product_reference": "multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le"
},
"product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64"
},
"product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x"
},
"product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64"
},
"product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le"
},
"product_reference": "multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64"
},
"product_reference": "multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64"
},
"product_reference": "multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x"
},
"product_reference": "multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64"
},
"product_reference": "multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x"
},
"product_reference": "multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le"
},
"product_reference": "multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64"
},
"product_reference": "multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64"
},
"product_reference": "multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64 as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64"
},
"product_reference": "multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x"
},
"product_reference": "multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le as a component of multicluster engine for Kubernetes 2.2 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
},
"product_reference": "multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39318",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237776"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not properly handle HMTL-like \"\u003c!--\" and \"--\u003e\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of HTML-like comments within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"known_not_affected": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "RHBZ#2237776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237776"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318"
},
{
"category": "external",
"summary": "https://go.dev/cl/526156",
"url": "https://go.dev/cl/526156"
},
{
"category": "external",
"summary": "https://go.dev/issue/62196",
"url": "https://go.dev/issue/62196"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2041.json",
"url": "https://vuln.go.dev/ID/GO-2023-2041.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-26T18:17:34+00:00",
"details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/clusters/cluster_mce_overview#installing-while-connected-online-mce",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6145"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of HTML-like comments within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39319",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237773"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of special tags within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"known_not_affected": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "RHBZ#2237773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319"
},
{
"category": "external",
"summary": "https://go.dev/cl/526157",
"url": "https://go.dev/cl/526157"
},
{
"category": "external",
"summary": "https://go.dev/issue/62197",
"url": "https://go.dev/issue/62197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2043.json",
"url": "https://vuln.go.dev/ID/GO-2023-2043.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-26T18:17:34+00:00",
"details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/clusters/cluster_mce_overview#installing-while-connected-online-mce",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6145"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of special tags within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Martin Seemann"
]
}
],
"cve": "CVE-2023-39321",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237777"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw has been marked as moderate instead of high like NVD \nQUICConn.HandleData buffers data and passes it to handlePostHandshakeMessage every time the buffer contains a complete message, while HandleData doesn\u0027t limit the amount of data it can buffer, a panic or denial of service would likely be lower severity,also in order to exploit this vulnerability, an attacker would have to smuggle partial handshake data which might be rejected altogether as per tls RFC specification.Therfore because of a lower severity denial of service and conditions that are beyond the scope of attackers control,we have marked this as moderate severity",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"known_not_affected": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "RHBZ#2237777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2044.json",
"url": "https://vuln.go.dev/ID/GO-2023-2044.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-26T18:17:34+00:00",
"details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/clusters/cluster_mce_overview#installing-while-connected-online-mce",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6145"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections"
},
{
"acknowledgments": [
{
"names": [
"Marten Seemann"
]
}
],
"cve": "CVE-2023-39322",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237778"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: lack of a limit on buffered post-handshake",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A vulnerability was found in the Go QUIC protocol implementation in the logic that processes post-handshake messages. It is an uncontrolled resource consumption flaw, triggered when a malicious connection sends data without an enforced upper bound. This leads to unbounded memory growth, causing the service to crash and resulting in a denial of service.The single-dimensional impact of denial of service and the added complexity of whether the resource exhaustion would happen, being out of an attacker\u0027s control,this has been rated as moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"known_not_affected": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "RHBZ#2237778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2045.json",
"url": "https://vuln.go.dev/ID/GO-2023-2045.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-26T18:17:34+00:00",
"details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/clusters/cluster_mce_overview#installing-while-connected-online-mce",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6145"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: lack of a limit on buffered post-handshake"
},
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"known_not_affected": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-26T18:17:34+00:00",
"details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/clusters/cluster_mce_overview#installing-while-connected-online-mce",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6145"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"known_not_affected": [
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-26T18:17:34+00:00",
"details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/clusters/cluster_mce_overview#installing-while-connected-online-mce",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6145"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:13ceb488e9022286773218de2d35eed798ae435975faaf7b394da3f6a44a655b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:301d15258f99bfe86cc0e0a780c13399eecf5d6e6264138fe12acba35edf0a13_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:444adb203db753267008270647520b35c4b5191c626dcde98994d154fe6378b6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/agent-service-rhel8@sha256:45e1c82fa7539f32cdaa7eae2bbcbbffb1b9fa4d84c3a9a12538f5e5bb3add8e_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:14c6a7954d75e2d0696fb708500bb0f2db970bedff1843ecdb559183bf079f87_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:2a3fa66f895963d60e39d6e97c3ae63898edff5de70d80fc02e7ab40d932f25f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:d0e502cdb5f6eaed51e3d21288da0c29fda2d423774371bc2e6cbfc9d77ca902_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/apiserver-network-proxy-rhel8@sha256:dcef337b257e8748e65cf4ffb2f8181a8349dc44c4b03027f78e90cc7f822f39_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:2d3ec283ffee2f6f026698d0f1eceefd73c0b7ed6d357e178966fe77b6d1d50b_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:5adaa639698a26676126cb55d9922c2864e3176e0afefcda6f93e251bff0ee9f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:a1d7888ec907404a0cd73ad74fcbe56c0992baa63463a27d5c757b9fbf5b12f7_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-image-service-rhel8@sha256:ad9ec504ca8cf5c26a269e3248edb446f3d85fb7a5ba791539647c30895f2b85_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:5d4e73b96c960fe85a6333392f208ae296c709d20c1dafbd49ef590198d69026_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-agent-rhel8@sha256:7f4ad3dda21ea85e7c7fb86801ecdf0bfd2616ce600f8e210f5b80e59f6e31ba_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:4a742bcab0256c709aebdcb5b32a7213e8ff1ad1ca9cb6fd885fd99889ea7ddf_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:a4b2de8bfd2aab93784315ed9f7c416de86ccc2c996d8311130fcccc37ab9f18_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-reporter-rhel8@sha256:d09a16c1e7eb6f4a547f35a98b0f8c6aaf777c54eea688cf17c52341f7073504_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:3dc40ac18f2b151bc4a2cf8f6d71bc75a10d6e48cae31190ef1a7780e733a85e_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:7b1b5cd96995fcc52fcb90e0a8037f428360579fb9d6f3e198963fc5afe28199_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/assisted-installer-rhel8@sha256:d435b5da83e7d1655a3d45e5f0c5d0ee16b50f9bb3ce1f5767b98ad32123a528_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:5bbe762813e6d3e6ce486e4ac79152f7fa025b6ae9b50f9d04662a3e43f547d8_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:94de655701d4d5a151929e026c9a284b4964f95ec957d91d13f8f58f284f2a02_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:b0ddf532be9bce73fdecd1939d0495b160ba5e76bdc915dc84fdbfd29223e9b5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/aws-encryption-provider-rhel8@sha256:fc9799c161a7c3a0dea38e1137881c6e85695f968b3f2b69e2f2254db8a506a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:346e75af2f8fbf6b1354832d53bcf7b4dfcf5a57f0a74f74b85cc653fb1c4eab_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65c7f69f5d1dd06da4a073d2878585f36c7f392516e045d4e756321e3da9c6b2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:65fb43b770b378a069cc4a085cfa831582d01776c6100b43b0032762fc6e007f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/backplane-rhel8-operator@sha256:adaede500462cb062df408292cf33bea8f75152f3538b4c5c2e33b29ff4d2f36_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:05fade3aa91e21858e2dc611d123c3c7219cb3ee3dacc5f4c0af3077ce281553_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1322ba8da3b4c6aada47c74789e39b78eb51fb4b39b55829aa744f60733a572e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:75d9f33c8182bdc28f1422856c1f48ab648929b5366bc55671cb851e8b55088f_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:95cdfc1ff2a7424b3ed2705f680008c4aa4c0b2f77faf788357b9c7923988238_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:47a172abec88a6d80dc5f44ac27a860cfdb7cc5b0f9d814436b749c185115199_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:51543e7a7b842bd5aac4b7a18ce5493b1c1b10fd4aa2f616f39b7d3e5f216888_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:aaf876d4b2b92e454220cfb6c4a2765f65b85fa16d69fe008017b6096a925da2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:c2963d4acdcd7a7e19d231f302b9a438883b661f5299d9a58988d588ef09aff6_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:38d3d68d7ec3bcfde0c7bcc26f29bdddcca462e001afc53a7c5879594f2bdab6_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:4a5663b97f02bd1d43717f34213664b8deb96457256f4a46b4763775f3bfb2a5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:d44407afb70de690bd9a3735509dded01feca581b8c94596f9f7580eb9e7e872_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:eb3ff1229636b158692969fe66a4beb99193cc11b969c28c85e3f8d8122188c0_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:1f8c9f64cf73726f05cef541afe4f977ef68a6119d35a50e019a0565154ac30c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:54dae953271f6bcd3ea7b6452b960c1d11ee87cedfb5292b65f356929b579bad_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:8fc6cc98bf2ff322c5dab7e7242a0b56137f6ca21033f6d726b77b452cd0ccf0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-api-rhel8@sha256:a26fc52c717987705005909ab2371925a3c7f2da1cbec99555ec6b5bf97c1798_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:420aed032aa777b2f107947899f839c39dcb83001779d0a46abdaa1c694036af_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:44c6ed8b8e28eef583f4e76c4da5aac6fc2d33d0aab932907054b1b8d71d3dd1_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:95848d33a2d4b431107c5e7205e9b8a512904922a9834afdc5cbaf7fa9ee76ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-curator-controller-rhel8@sha256:cea9577d6a0feb17a0b282ecf1d0ee017a56e4f2e3fa63f8c6a0cb3a780d3100_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:0c2108e6664dece9014c7be844df5f7725926aaca33d28ed1b9c3a876c19fcfb_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:2c946689b21a8e7c3d1f3dee2fb070becb572954cb20a6e45aee9b132a6c973b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:45981544df19e1839d9a5a638c3c298dc6f3be0aae4cf534b49afee082303b9a_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-image-set-controller-rhel8@sha256:c6cf9d0e14388b748791d1610efaa488c319cdb0852544723c51eaf8261aeeb8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:649b3d0174a6cf195401d9f649b09169115228eeff6f0ebaacaa86dc746984a2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:71c0034b4a40952491ce1835000365838822ed415c1238a7c6c82dcd0a1ec566_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:d40ad5fac0126a5ca31ab3461f6e9d02214deb66baea8fb7c384c2893af8d15b_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-addon-rhel8@sha256:fa430f3bb4ca57a9292615561cfc83c87137ad966bf45e19da0d8b0d9601776e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:11984055ea5d9528d09f73f1710fac33b4f4944c1d526f6fd7917175346c26c7_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:8549714610d5acfa02e447172de901d16b9a417597ed8847a86e54c0343e66f8_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:aeab55ae47246097d9862b9a531e9992e00972c1f46a46cefdb7d94bb25baf86_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/cluster-proxy-rhel8@sha256:ba982b491c35dd40aae02d5a75dd3f898249d8dc2eeceafa445b617b7e6867ea_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:05f170a6a876b15b8ade349f1024f1ba24da091ce3a6037934cfcf3055a18586_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:ae9c8267b416de8890df4e0fc77a0791b9ac4668fa01c11864b6195108365d83_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:cc5e46b2b0dcbabca7d963e2cd79231966600e832ad042a977eb7e8e8046a42f_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterclaims-controller-rhel8@sha256:d153eba1230b53540be1d8da5c07816cfbaf43a120f6fa58ae104b633637d435_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:66179c37d6fb933e5215021278f4a65a4e4647b18697578227221ef64d08d4a2_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:6bdd476aa24ccacf2f3be3c5cd37600501a2379a4668045567d51ce88a839b65_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c85388a1b41abb429354b989ce01a2065f840da88a38df5c4a6e0c904c03a6b5_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:f3d25bf5a3fb0fb8ddfc0ccd5fcd73f9fc533ea2fd7dbeaaa1e557b351421dcf_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:564609237b874dd21e9be0424863266f54e25f0f2fb47a4db19a8499283cf25c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:bd95d4802f5f77ef3ef521a0824ae61b119bff52d413c89578cab0e53a8c7a38_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:c2e21b373c613e68070528232217914db185eff34cf84d5113d9265361b7d316_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/discovery-rhel8@sha256:f68a57bf14a6698a512b65e46c2595bc1c201a2ce7872418f1b06cbcfe55795c_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:57fb135eb11cb93894d629213cede6c4a345fa2b19349b2b6eb66323ba8064ef_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:97409c4bf39293827ce3dadf2d0dcc1747f74cd0d5091019de636d0e06957bbb_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:f00ebe414e51c2e502c8e254af3c5ae7056a591a4f4da855817dd8e8ad862d83_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hive-rhel8@sha256:fa0a2dc0421fd9825a5f64b059826091ade79b73e9523b322c35e7120188b0bb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:55f1b4be1efe373833fc57f2cd731834924647973d12cf647984a1856c84b0a8_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:5c9a19f8feccbacd1d097ac183ee3b4a06f9c277abf1421604c50a3618d00fb5_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:92df9df5643072cbe36e075ac6a8d533b7c9736d38e978ab6d8d3207de985ee0_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-cli-rhel8@sha256:dcbedf06462850300f71e119fd46b7feac182d069c58ab6594d8155c8302d566_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:33c92a8f71f2075967fe9707cafac4705acfd3c7d3dbfc03d44a300d11f8b3c9_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:9f37612352002537fa14edee1336b710e45786050edeb3c50525ed7123006a88_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:bf86b86099bcfa86ab5fe1132498f8f314441408f75217df40a3f17ea7924034_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/hypershift-rhel8-operator@sha256:d22a94adcb4df407f1e918178c3aab659a7c40be4ae4d91abb4c8bf77cd50509_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/klusterlet-operator-bundle@sha256:6090d7c88fb7dcc463f80e4a7c86102a411bf32160f6cbbfd55c7daea282bc92_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:5028187dd9145f91cbec4f3a37861abe0a493a1fb95f13506296cc9ff8faba7e_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:9961cd9e68650d1f430fbfd46db02baee530e7a4104e7b937d594929d31d9538_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bbb2386f2ae82f9282877555161ddac8683f80bb95d07ab0333f3ed51f4da0fa_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/managedcluster-import-controller-rhel8@sha256:d5915b27cd5fdb13d56d00d4b94fb58203ba75849c3317a555e222b05239d5f5_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:529ddee9eafb42815b2cec46a3c11e88be6b29ff58142288d77f71557283b304_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:b2822b32471c38c6384caeb3ea9f47e914d69a6aabd82e50739780a55b5a1110_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/mce-operator-bundle@sha256:d54375f38b7d2901ec83e500c79fcf6e21a607bfb753e2ae6107c38f73d2fe9f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:280ee6148bc42ab88ff483a56be8ac7be390ce7fc2bfb3dfe99b080e292c9dee_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:74837b37294468d77d9ae890c1cdf46f539a2a258553500a396de3b99237e253_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:c266bdcb42da7bbd4c92e68f462ae42643f8937d4f432ff917e26abb7fbe7a82_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicloud-manager-rhel8@sha256:fd788e278c3f96ca45f0b6ef178de9d94c496390e39a89834f8d4747ac992c7b_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:18c5b6c1a503a44ab3efb19e0ffcb88fd42499e056e9e94883bad512f898ba20_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a8645dae7272a25d3f666d22b673688227a4723af7ff0d0bab1948cd927618a8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:d5cbc7dec099676a2893e4d750453d6620971f171a5b20ca3813a69a0b987dfc_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:f39c140b644ceaa84993041f052cf1e3059fd05f3f66f125ffe5b9a97cb7b622_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:3e1c00734b635f973d978d0119ccbe944d9d37e63a185765a56db571fc90c7b0_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:75ec5b31ec19c6f84ae0557eb16998e71bc85096b3b807d0329608362d8f3102_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:7d4fa723f9fe34a4520ee6afcddf7586d3066cf64c1733cef5484baa071fba40_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:8739fd1b941ccc676330dc8185382ed4bc46b20e55e09ba81b0c9ceb7676b51d_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:07ab7148d89dacea0dd1dfda3ee7fc08816d39b08eafe96580ded1c65d6607e8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:9f46121efddfb4acc798adaccfa3ac9428858b43d8adea3efdbf5d7fad73eac3_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:cda585eca14419f3e8ad482e1a6eb021c0ae83c1fec284a7c10787ab13f2de08_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:d7aa0c96bb5d944cf925f4db924c8c10adee84519c45dffefc7898873743821f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:06291b0360950d5d9552246b4bd8e9c76e6d6701bafbdabeac40c97cd3691fc2_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:1be91e48d39a89db42a7bcde18e1247e4143d242897b3ac8b0a4bf2980265179_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2105ee5d8e82a1a889551075886ba946f0a5e8186ceb356f5be53ca6cc9caa35_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:6ab84dc7bcaf2a1b8c58f371547d47292895a5a192d83d52740201341791f2db_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:7af7515cbcb9d0a9d0642ee0a4073a6fcc3ea4ed30b074cbf275498c2d38d030_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:837a264de600671af8e6b329a0d1aedf76865d125678d1e1b9fe7f6212a8d2e9_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:a4a9ccf8f597f6b1dcdbf29247b9440f3623e23cfe49411999ea684d11ca11aa_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/must-gather-rhel8@sha256:c91154ced307f3421a95d55929a0b3f09b7ba6acb1a503d3b0931e5d57f5479e_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:1d2e06b13bd0cdbd7b4f11e6a48276a466e90023372253639ad1859c58c9d18c_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:6804525adea26731c11273197582172c30e51e54bca0be3791444b518014557f_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:a5d1f477b81c23606e8f64abaa3c1fc2b433f68bdeb869850d015f2d63fc7c13_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/placement-rhel8@sha256:fd382d8b4bdd3bde7935e5ad02b6cc36055891b01bb284a30dfe3de155b5a603_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:20151e8fecc49374a948366083ec02e2efaba84a84a7d3af7757e7e8709ffbcd_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:52b07f6cc6418fe26c63f8878fa842270a33f6dbc95385b3e6163786a1b67a16_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:8536216f0f019a29af598f5788c193986c5cde4d3f55fcc9f59646a38be430c8_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/provider-credential-controller-rhel8@sha256:e7dc21f124fba54882801cfbebc09fdc945d821e99aaed443aa179d6f6f1c9ab_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:4387e1f13d5ac8139fc6ec926b872b36335b5d422a886d9f129d9493292c560c_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:8d91147a2b462965ebaa22a219450ba4e88cfb8f1c9d5b7bf35c45c98aceafcb_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:c4adb05602711d00caa49eff2063843ebb1ead9de59bb0f8713d8505002b21e2_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-operator-rhel8@sha256:ef58d8acde73b203f92a8d09db4909ae0d29f4968911fad8bf2855ba6d24734a_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:4d3be051fb0829f0a36616c70041ec8eab701ae327b2298244a3cccd729a7040_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:53dd2682b25c39c5409c610d540bd4b6262aec171d27147703bd1b7f95e04915_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:d8f7c496c4eb82a5cc011d96ee634d4d59ab722fe9e757dfad14e4028207e9dc_ppc64le",
"8Base-multicluster-engine-2.2:multicluster-engine/registration-rhel8@sha256:f6e7d1c75af32e5f17ed381a72ca2175e592a0335cc0fdb5f93e88ec4131b3ef_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:599e0cd4f185adcd520da278bb548b7380020f92d9fbc7149a342fb34ef88f81_arm64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:63ce281389b1d6398188bb0baf2d64c02dd9472091a3d9767c3261289704e54d_amd64",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:70d849a1d75a9fe97db7cdbd3281546f22aa3801cbc4fc96117a4a4ba441ac41_s390x",
"8Base-multicluster-engine-2.2:multicluster-engine/work-rhel8@sha256:d051b848bdd49f506ad5f96c9dd21d1ef314c598cb35f113dc2ad23dc9c2ff52_ppc64le"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:6787
Vulnerability from csaf_redhat - Published: 2023-11-08 01:54 - Updated: 2026-01-21 10:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for network-observability-console-plugin-container,\nnetwork-observability-ebpf-agent-container,\nnetwork-observability-flowlogs-pipeline-container,\nnetwork-observability-operator-bundle-container, and\nnetwork-observability-operator-container is now available for\nNETWORK-OBSERVABILITY-1.4.0-RHEL-9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Security Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work\n (CVE-2023-39325)\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack\n(Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6787",
"url": "https://access.redhat.com/errata/RHSA-2023:6787"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6787.json"
}
],
"title": "Red Hat Security Advisory: Network Observability security update",
"tracking": {
"current_release_date": "2026-01-21T10:16:10+00:00",
"generator": {
"date": "2026-01-21T10:16:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:6787",
"initial_release_date": "2023-11-08T01:54:46+00:00",
"revision_history": [
{
"date": "2023-11-08T01:54:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-08T01:54:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T10:16:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "NETOBSERV 1.4 for RHEL 9",
"product": {
"name": "NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_observ_optr:1.4.0::el9"
}
}
}
],
"category": "product_family",
"name": "Network Observability"
},
{
"branches": [
{
"category": "product_version",
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"product": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"product_id": "network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf?arch=s390x\u0026repository_url=registry.redhat.io/network-observability/network-observability-console-plugin-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"product": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"product_id": "network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9?arch=s390x\u0026repository_url=registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"product": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"product_id": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4?arch=s390x\u0026repository_url=registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"product": {
"name": "network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"product_id": "network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d?arch=s390x\u0026repository_url=registry.redhat.io/network-observability/network-observability-operator-bundle\u0026tag=1.4.0-81"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"product": {
"name": "network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"product_id": "network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515?arch=s390x\u0026repository_url=registry.redhat.io/network-observability/network-observability-rhel9-operator\u0026tag=v1.4.0-57"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"product": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"product_id": "network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability/network-observability-console-plugin-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"product": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"product_id": "network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"product": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"product_id": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"product": {
"name": "network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"product_id": "network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability/network-observability-operator-bundle\u0026tag=1.4.0-81"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le",
"product": {
"name": "network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le",
"product_id": "network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability/network-observability-rhel9-operator\u0026tag=v1.4.0-57"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"product": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"product_id": "network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f?arch=arm64\u0026repository_url=registry.redhat.io/network-observability/network-observability-console-plugin-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"product": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"product_id": "network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e?arch=arm64\u0026repository_url=registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"product": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"product_id": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82?arch=arm64\u0026repository_url=registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"product": {
"name": "network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"product_id": "network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132?arch=arm64\u0026repository_url=registry.redhat.io/network-observability/network-observability-operator-bundle\u0026tag=1.4.0-81"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"product": {
"name": "network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"product_id": "network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9?arch=arm64\u0026repository_url=registry.redhat.io/network-observability/network-observability-rhel9-operator\u0026tag=v1.4.0-57"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"product": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"product_id": "network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491?arch=amd64\u0026repository_url=registry.redhat.io/network-observability/network-observability-console-plugin-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"product": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"product_id": "network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288?arch=amd64\u0026repository_url=registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"product": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"product_id": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611?arch=amd64\u0026repository_url=registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9\u0026tag=v1.4.0-57"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64",
"product": {
"name": "network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64",
"product_id": "network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68?arch=amd64\u0026repository_url=registry.redhat.io/network-observability/network-observability-operator-bundle\u0026tag=1.4.0-81"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"product": {
"name": "network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"product_id": "network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54?arch=amd64\u0026repository_url=registry.redhat.io/network-observability/network-observability-rhel9-operator\u0026tag=v1.4.0-57"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64"
},
"product_reference": "network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64"
},
"product_reference": "network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le"
},
"product_reference": "network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x"
},
"product_reference": "network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x"
},
"product_reference": "network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64"
},
"product_reference": "network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le"
},
"product_reference": "network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64"
},
"product_reference": "network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x"
},
"product_reference": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64"
},
"product_reference": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le"
},
"product_reference": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64"
},
"product_reference": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x"
},
"product_reference": "network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le"
},
"product_reference": "network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64"
},
"product_reference": "network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64"
},
"product_reference": "network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64"
},
"product_reference": "network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64"
},
"product_reference": "network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x"
},
"product_reference": "network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le"
},
"product_reference": "network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64"
],
"known_not_affected": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-08T01:54:46+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6787"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64"
],
"known_not_affected": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-08T01:54:46+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6787"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:95368eb313a5a252a63f567ebf8a51ca07793a8e9147bae99ed69f80ea305e6f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a60a5f1b256d627d156d5b6554b0031380e62866a90963c7933ce87b21f83491_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:ee3f049527626d646f81d0a16d1911f0efe71c9286ae657429c9f0f6c6c505e3_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:f6be4953742e271e6507aa91a8ed976d7dfd68c3b9634382b18d47bb5d968ddf_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:63c6d967f4c2ec9a5047be4c5e02676d80243dbc3cc6bad508e6b3162a631be9_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:6da9818638f28ca862681a668e38651ebeee18661738ae8346cbd0ecb13d4288_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:8ac8ae32fae59ae22688a6772eb77245b24b6dbe55fc309bd31395b006cbdfad_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:d5a86121d054b9ea8a7b7ccead3a42d4b9e5c17929e188b8bd780517ceb7d96e_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:26c5d2dc469ae8688abb5b87041f00d342a8542e810b1828af29781faef300a4_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:51049a42b3f3f75a2dc670f3fa026a1d68280664a0ef47c3ad2fdfdb97c25611_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6620a766d61fc0395a2557fc0920f54a151d605dc932ca26fe78cfe0193c9c1c_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:83858e6e99d9669b5a8766aac010ca50df6df056496367f501d8268de5d4df82_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:1223ca28b4bbe5c4f46fdcfd0c58794034408f5c86c87e5b6eab6c140d48017d_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:8e2171ae86ab9e78bf7827dd33cbdaaf5a4ff566da50bb7f659f613258712090_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:cfc16fa970403528771979f8e509660918c32d1532ae419824cc81348cee4132_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:dc8f77f41b077986639b3f594f9e5eb3bf56dad90bed1927921f973c4171ba68_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:2b99cf0df552ca77d35e8fd8e2e6c81938369c59241697f6220c40df27b9cd54_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:4c49b198ec1c97aeec39dd445b30e96af12f43a74166da53a63c11617c69a0b9_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:63f7b3fe3fde774f8b8b76b8eb17b3c62220bf3270320349942ab042518e1515_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:8e560f63a3bab2a6256dc6f1c5b8c88afc7f4a7210fef2986e02d2b1018a66b7_ppc64le"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_7482
Vulnerability from csaf_redhat - Published: 2023-11-24 16:56 - Updated: 2024-12-17 02:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New Red Hat Single Sign-On 7.6.6 packages are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.6 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.5, and includes bug fixes and enhancements.\n\nSecurity Fix(es):\n* undertow: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n* netty-codec-http2: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n* bouncycastle: potential blind LDAP injection attack using a self-signed certificate (CVE-2023-33201)\n* keycloak: impersonation and lockout possible through incorrect handling of email trust (CVE-2023-0105)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7482",
"url": "https://access.redhat.com/errata/RHSA-2023:7482"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2158910",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158910"
},
{
"category": "external",
"summary": "2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7482.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 7",
"tracking": {
"current_release_date": "2024-12-17T02:54:39+00:00",
"generator": {
"date": "2024-12-17T02:54:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:7482",
"initial_release_date": "2023-11-24T16:56:09+00:00",
"revision_history": [
{
"date": "2023-11-24T16:56:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-24T16:56:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T02:54:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product": {
"name": "Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"product": {
"name": "rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"product_id": "rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.11-2.redhat_00001.1.el7sso?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"product": {
"name": "rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"product_id": "rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.11-2.redhat_00001.1.el7sso?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"product": {
"name": "rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"product_id": "rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@18.0.11-2.redhat_00001.1.el7sso?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
},
"product_reference": "rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"relates_to_product_reference": "7Server-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src"
},
"product_reference": "rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"relates_to_product_reference": "7Server-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
},
"product_reference": "rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"relates_to_product_reference": "7Server-RHSSO-7.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Willem Noort"
],
"organization": "Inverid",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2023-0105",
"cwe": {
"id": "CWE-841",
"name": "Improper Enforcement of Behavioral Workflow"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158910"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak. This flaw allows impersonation and lockout due to the email trust not being handled correctly in Keycloak. An attacker can shadow other users with the same email and lockout or impersonate them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "keycloak: impersonation and lockout possible through incorrect handling of email trust",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0105"
},
{
"category": "external",
"summary": "RHBZ#2158910",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158910"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0105"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c7xw-p58w-h6fj",
"url": "https://github.com/advisories/GHSA-c7xw-p58w-h6fj"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-24T16:56:09+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7482"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "keycloak: impersonation and lockout possible through incorrect handling of email trust"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-33201"
},
{
"category": "external",
"summary": "RHBZ#2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201"
},
{
"category": "external",
"summary": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-24T16:56:09+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7482"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-24T16:56:09+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7482"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.11-2.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.11-2.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_7486
Vulnerability from csaf_redhat - Published: 2023-11-24 16:53 - Updated: 2024-12-17 02:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new image is available for Red Hat Single Sign-On 7.6.6, running on OpenShift Container Platform 3.10 and 3.11, and 4.3.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On is an integrated sign-on solution, available as a Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat Single Sign-On for OpenShift image provides an authentication server that you can use to log in centrally, log out, and register. You can also manage user accounts for web applications, mobile applications, and RESTful web services.\n\nThis erratum releases a new image for Red Hat Single Sign-On 7.6.6 for use within the OpenShift Container Platform 3.10, OpenShift Container Platform 3.11, and OpenShift Container Platform 4.3 cloud computing Platform-as-a-Service (PaaS) for on-premise or private cloud deployments, aligning with the standalone product release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS\nattack (Rapid Reset Attack) (CVE-2023-44487)\n* netty-codec-http2: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable\nto a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n* bouncycastle: potential blind LDAP injection attack using a self-signed\ncertificate (CVE-2023-33201)\n* keycloak: impersonation and lockout possible through incorrect handling of\nemail trust (CVE-2023-0105)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7486",
"url": "https://access.redhat.com/errata/RHSA-2023:7486"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2158910",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158910"
},
{
"category": "external",
"summary": "2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7486.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 for OpenShift image enhancement and security update",
"tracking": {
"current_release_date": "2024-12-17T02:55:06+00:00",
"generator": {
"date": "2024-12-17T02:55:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:7486",
"initial_release_date": "2023-11-24T16:53:18+00:00",
"revision_history": [
{
"date": "2023-11-24T16:53:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-24T16:53:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T02:55:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Middleware Containers for OpenShift",
"product": {
"name": "Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhosemc:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"product": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf?arch=ppc64le\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-36"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"product": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"product_identification_helper": {
"purl": "pkg:oci/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514?arch=amd64\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-36"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x",
"product": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x",
"product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d?arch=s390x\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-36"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64 as a component of Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64"
},
"product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"relates_to_product_reference": "8Base-RHOSE-Middleware"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le as a component of Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le"
},
"product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-Middleware"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x as a component of Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x"
},
"product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x",
"relates_to_product_reference": "8Base-RHOSE-Middleware"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Willem Noort"
],
"organization": "Inverid",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2023-0105",
"cwe": {
"id": "CWE-841",
"name": "Improper Enforcement of Behavioral Workflow"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158910"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak. This flaw allows impersonation and lockout due to the email trust not being handled correctly in Keycloak. An attacker can shadow other users with the same email and lockout or impersonate them.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "keycloak: impersonation and lockout possible through incorrect handling of email trust",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0105"
},
{
"category": "external",
"summary": "RHBZ#2158910",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158910"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0105"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c7xw-p58w-h6fj",
"url": "https://github.com/advisories/GHSA-c7xw-p58w-h6fj"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-24T16:53:18+00:00",
"details": "To update to the latest Red Hat Single Sign-On 7.6.6 for OpenShift image, follow these steps to pull in the content:\n\n1. On your main hosts, ensure you are logged into the CLI as a cluster administrator or user with project administrator access to the global \"openshift\" project. For example:\n\n$ oc login -u system:admin\n\n2. Update the core set of Red Hat Single Sign-On resources for OpenShift in the \"openshift\" project by running the following commands:\n\n$ for resource in sso76-image-stream.json \\\nsso76-https.json \\\nsso76-mysql.json \\\nsso76-mysql-persistent.json \\\nsso76-postgresql.json \\\nsso76-postgresql-persistent.json \\\nsso76-x509-https.json \\\nsso76-x509-mysql-persistent.json \\\nsso76-x509-postgresql-persistent.json\ndo\noc replace -n openshift --force -f \\\nhttps://raw.githubusercontent.com/jboss-container-images/redhat-sso-7-openshift-image/v7.6.6.GA/templates/${resource}\ndone\n\n3. Install the Red Hat Single Sign-On 7.6.6 for OpenShift streams in the \"openshift\" project by running the following command:\n\n$ oc -n openshift import-image redhat-sso76-openshift:1.0",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7486"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "keycloak: impersonation and lockout possible through incorrect handling of email trust"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-33201"
},
{
"category": "external",
"summary": "RHBZ#2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201"
},
{
"category": "external",
"summary": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-24T16:53:18+00:00",
"details": "To update to the latest Red Hat Single Sign-On 7.6.6 for OpenShift image, follow these steps to pull in the content:\n\n1. On your main hosts, ensure you are logged into the CLI as a cluster administrator or user with project administrator access to the global \"openshift\" project. For example:\n\n$ oc login -u system:admin\n\n2. Update the core set of Red Hat Single Sign-On resources for OpenShift in the \"openshift\" project by running the following commands:\n\n$ for resource in sso76-image-stream.json \\\nsso76-https.json \\\nsso76-mysql.json \\\nsso76-mysql-persistent.json \\\nsso76-postgresql.json \\\nsso76-postgresql-persistent.json \\\nsso76-x509-https.json \\\nsso76-x509-mysql-persistent.json \\\nsso76-x509-postgresql-persistent.json\ndo\noc replace -n openshift --force -f \\\nhttps://raw.githubusercontent.com/jboss-container-images/redhat-sso-7-openshift-image/v7.6.6.GA/templates/${resource}\ndone\n\n3. Install the Red Hat Single Sign-On 7.6.6 for OpenShift streams in the \"openshift\" project by running the following command:\n\n$ oc -n openshift import-image redhat-sso76-openshift:1.0",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7486"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-24T16:53:18+00:00",
"details": "To update to the latest Red Hat Single Sign-On 7.6.6 for OpenShift image, follow these steps to pull in the content:\n\n1. On your main hosts, ensure you are logged into the CLI as a cluster administrator or user with project administrator access to the global \"openshift\" project. For example:\n\n$ oc login -u system:admin\n\n2. Update the core set of Red Hat Single Sign-On resources for OpenShift in the \"openshift\" project by running the following commands:\n\n$ for resource in sso76-image-stream.json \\\nsso76-https.json \\\nsso76-mysql.json \\\nsso76-mysql-persistent.json \\\nsso76-postgresql.json \\\nsso76-postgresql-persistent.json \\\nsso76-x509-https.json \\\nsso76-x509-mysql-persistent.json \\\nsso76-x509-postgresql-persistent.json\ndo\noc replace -n openshift --force -f \\\nhttps://raw.githubusercontent.com/jboss-container-images/redhat-sso-7-openshift-image/v7.6.6.GA/templates/${resource}\ndone\n\n3. Install the Red Hat Single Sign-On 7.6.6 for OpenShift streams in the \"openshift\" project by running the following command:\n\n$ oc -n openshift import-image redhat-sso76-openshift:1.0",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7486"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:16c055e14341e0373dc090196b3bfb1c962da11343e1322bd7dc59eb9df3b514_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:42eacda40b19a10366ebf98e8db9b7f14f09e567a66beb454c8c50c2ac7827bf_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:da370ba2e4eb8b5af4876defc3a05437e01d224240aff7e0129bc0b96c99124d_s390x"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:5869
Vulnerability from csaf_redhat - Published: 2023-10-18 23:16 - Updated: 2026-01-21 05:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\n* nodejs: integrity checks according to policies can be circumvented (CVE-2023-38552)\n\n* nodejs: code injection via WebAssembly export names (CVE-2023-39333)\n\n* node-undici: cookie leakage (CVE-2023-45143)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5869",
"url": "https://access.redhat.com/errata/RHSA-2023:5869"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2244104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244104"
},
{
"category": "external",
"summary": "2244415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244415"
},
{
"category": "external",
"summary": "2244418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244418"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5869.json"
}
],
"title": "Red Hat Security Advisory: nodejs:18 security update",
"tracking": {
"current_release_date": "2026-01-21T05:42:48+00:00",
"generator": {
"date": "2026-01-21T05:42:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:5869",
"initial_release_date": "2023-10-18T23:16:45+00:00",
"revision_history": [
{
"date": "2023-10-18T23:16:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-18T23:16:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T05:42:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product": {
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18)",
"product_id": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18)",
"product_id": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product": {
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18)",
"product_id": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.8.1-1.18.18.2.1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"product": {
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src (nodejs:18)",
"product_id": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=src\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src (nodejs:18)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=src\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"product": {
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src (nodejs:18)",
"product_id": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.7.0%2B15582%2B19c314fa?arch=src\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"product": {
"name": "nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch (nodejs:18)",
"product_id": "nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch (nodejs:18)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=noarch\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"product": {
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch (nodejs:18)",
"product_id": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.7.0%2B15582%2B19c314fa?arch=noarch\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"product": {
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch (nodejs:18)",
"product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel8.7.0%2B15582%2B19c314fa?arch=noarch\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product": {
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18)",
"product_id": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18)",
"product_id": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product": {
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18)",
"product_id": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.8.1-1.18.18.2.1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product": {
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18)",
"product_id": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18)",
"product_id": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product": {
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18)",
"product_id": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.8.1-1.18.18.2.1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product": {
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18)",
"product_id": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18)",
"product_id": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.18.2-1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product": {
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18)",
"product_id": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.8.1-1.18.18.2.1.module%2Bel8.8.0%2B20407%2Bc11d40bd?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020231015215042:63b34585"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18"
},
"product_reference": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18"
},
"product_reference": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18"
},
"product_reference": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18"
},
"product_reference": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
},
"product_reference": "nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18"
},
"product_reference": "nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18"
},
"product_reference": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18"
},
"product_reference": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18"
},
"product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18"
},
"product_reference": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18"
},
"product_reference": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18"
},
"product_reference": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
},
"product_reference": "npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-38552",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2023-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2244415"
}
],
"notes": [
{
"category": "description",
"text": "When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to node\u0027s policy implementation, thus effectively disabling the integrity check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: integrity checks according to policies can be circumvented",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is triggered in an experimental feature that is not widely deployed at the time this vulnerability was disclosed, which is why Red Hat has marked this vulnerability as moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38552"
},
{
"category": "external",
"summary": "RHBZ#2244415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244415"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38552"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-18T23:16:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5869"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: integrity checks according to policies can be circumvented"
},
{
"cve": "CVE-2023-39333",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2244418"
}
],
"notes": [
{
"category": "description",
"text": "Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: code injection via WebAssembly export names",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The inclusion of nodejs:20/nodejs commenced with RHEL-9.3 GA through RHEA-2023:6529 (https://access.redhat.com/errata/RHEA-2023:6529), which inherently incorporates the fix for CVE-2023-39333. Hence, Nodejs-20, as shipped with Red Hat Enterprise Linux 9, is not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39333"
},
{
"category": "external",
"summary": "RHBZ#2244418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244418"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39333"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-18T23:16:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5869"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs: code injection via WebAssembly export names"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-18T23:16:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5869"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
},
{
"cve": "CVE-2023-45143",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2244104"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Undici node package due to the occurrence of Cross-origin requests, possibly leading to a cookie header leakage. By default, cookie headers are forbidden request headers, and they must be enabled. This flaw allows a malicious user to access this leaked cookie if they have control of the redirection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-undici: cookie leakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since this requires a non-standard configuration, as well as control of the redirection, Red Hat rates this as having a Low impact.\n\nRed Hat Developer Hub has included a fix for this.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45143"
},
{
"category": "external",
"summary": "RHBZ#2244104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244104"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45143"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g"
}
],
"release_date": "2023-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-18T23:16:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5869"
},
{
"category": "workaround",
"details": "No current mitigation is available.",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.18.2-1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "node-undici: cookie leakage"
}
]
}
RHSA-2023:5719
Vulnerability from csaf_redhat - Published: 2023-10-16 11:30 - Updated: 2026-01-21 10:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for go-toolset-1.19 and go-toolset-1.19-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work [CVE-2023-44487] (CVE-2023-39325)\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5719",
"url": "https://access.redhat.com/errata/RHSA-2023:5719"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5719.json"
}
],
"title": "Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update",
"tracking": {
"current_release_date": "2026-01-21T10:15:31+00:00",
"generator": {
"date": "2026-01-21T10:15:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:5719",
"initial_release_date": "2023-10-16T11:30:56+00:00",
"revision_history": [
{
"date": "2023-10-16T11:30:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-16T11:30:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T10:15:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2023::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2023::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Tools"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.src",
"product": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.src",
"product_id": "go-toolset-1.19-0:1.19.13-1.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19@1.19.13-1.el7_9?arch=src"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"product": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"product_id": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang@1.19.13-2.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"product": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"product_id": "go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19@1.19.13-1.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"product": {
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"product_id": "go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-build@1.19.13-1.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"product": {
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"product_id": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-runtime@1.19.13-1.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"product": {
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"product_id": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-scldevel@1.19.13-1.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"product_id": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang@1.19.13-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"product_id": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-bin@1.19.13-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"product_id": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-misc@1.19.13-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"product_id": "go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-race@1.19.13-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"product_id": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-src@1.19.13-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"product_id": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-tests@1.19.13-2.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"product": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"product_id": "go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19@1.19.13-1.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"product": {
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"product_id": "go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-build@1.19.13-1.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"product": {
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"product_id": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-runtime@1.19.13-1.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"product": {
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"product_id": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-scldevel@1.19.13-1.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"product_id": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang@1.19.13-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"product_id": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-bin@1.19.13-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"product_id": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-misc@1.19.13-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"product_id": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-src@1.19.13-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"product_id": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-tests@1.19.13-2.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"product_id": "go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19@1.19.13-1.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"product_id": "go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-build@1.19.13-1.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"product_id": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-runtime@1.19.13-1.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"product_id": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-scldevel@1.19.13-1.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"product_id": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang@1.19.13-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"product_id": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-bin@1.19.13-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"product_id": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-misc@1.19.13-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"product_id": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-src@1.19.13-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"product_id": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-tests@1.19.13-2.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"product": {
"name": "go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"product_id": "go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.19-golang-docs@1.19.13-2.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src"
},
"product_reference": "go-toolset-1.19-0:1.19.13-1.el7_9.src",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src"
},
"product_reference": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch"
},
"product_reference": "go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src"
},
"product_reference": "go-toolset-1.19-0:1.19.13-1.el7_9.src",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-0:1.19.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src"
},
"product_reference": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch"
},
"product_reference": "go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x"
},
"product_reference": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64"
},
"product_reference": "go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2023.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-16T11:30:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5719"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-16T11:30:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5719"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Server-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-build-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.src",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-bin-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-docs-0:1.19.13-2.el7_9.noarch",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-misc-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-race-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-src-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-golang-tests-0:1.19.13-2.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-runtime-0:1.19.13-1.el7_9.x86_64",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.ppc64le",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.s390x",
"7Workstation-DevTools-2023.2:go-toolset-1.19-scldevel-0:1.19.13-1.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:5708
Vulnerability from csaf_redhat - Published: 2023-10-16 08:59 - Updated: 2026-01-21 05:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for dotnet6.0 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": ".NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.\n\nNew versions of .NET that address a security vulnerability are now available. The updated versions are .NET 6.0 to SDK 6.0.123 and Runtime 6.0.23.\n\nSecurity Fix(es):\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5708",
"url": "https://access.redhat.com/errata/RHSA-2023:5708"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5708.json"
}
],
"title": "Red Hat Security Advisory: dotnet6.0 security update",
"tracking": {
"current_release_date": "2026-01-21T05:42:28+00:00",
"generator": {
"date": "2026-01-21T05:42:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:5708",
"initial_release_date": "2023-10-16T08:59:30+00:00",
"revision_history": [
{
"date": "2023-10-16T08:59:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-16T08:59:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T05:42:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"product": {
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"product_id": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-6.0-source-built-artifacts@6.0.123-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64",
"product": {
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64",
"product_id": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet6.0-debugsource@6.0.123-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"product": {
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"product_id": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-6.0-debuginfo@6.0.23-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"product": {
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"product_id": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-6.0-debuginfo@6.0.23-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"product": {
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"product_id": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-6.0-debuginfo@6.0.23-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"product": {
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"product_id": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-6.0-debuginfo@6.0.123-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"product": {
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"product_id": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet6.0-debuginfo@6.0.123-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"product": {
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"product_id": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-runtime-6.0@6.0.23-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"product": {
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"product_id": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-targeting-pack-6.0@6.0.23-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"product": {
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"product_id": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-6.0@6.0.23-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"product": {
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"product_id": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-6.0@6.0.23-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"product": {
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"product_id": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-6.0@6.0.23-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"product": {
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"product_id": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-6.0@6.0.123-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"product": {
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"product_id": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-targeting-pack-6.0@6.0.23-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"product": {
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"product_id": "dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-templates-6.0@6.0.123-1.el9_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"product": {
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"product_id": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-6.0-source-built-artifacts@6.0.123-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"product": {
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"product_id": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet6.0-debugsource@6.0.123-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"product": {
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"product_id": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-6.0-debuginfo@6.0.23-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"product": {
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"product_id": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-6.0-debuginfo@6.0.23-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"product": {
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"product_id": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-6.0-debuginfo@6.0.23-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"product": {
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"product_id": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-6.0-debuginfo@6.0.123-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"product": {
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"product_id": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet6.0-debuginfo@6.0.123-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"product": {
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"product_id": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-runtime-6.0@6.0.23-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"product": {
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"product_id": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-targeting-pack-6.0@6.0.23-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"product": {
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"product_id": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-6.0@6.0.23-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"product": {
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"product_id": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-6.0@6.0.23-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"product": {
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"product_id": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-6.0@6.0.23-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"product": {
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"product_id": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-6.0@6.0.123-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"product": {
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"product_id": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-targeting-pack-6.0@6.0.23-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"product": {
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"product_id": "dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-templates-6.0@6.0.123-1.el9_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"product": {
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"product_id": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-6.0-source-built-artifacts@6.0.123-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"product": {
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"product_id": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet6.0-debugsource@6.0.123-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"product": {
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"product_id": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-6.0-debuginfo@6.0.23-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"product": {
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"product_id": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-6.0-debuginfo@6.0.23-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"product": {
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"product_id": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-6.0-debuginfo@6.0.23-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"product": {
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"product_id": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-6.0-debuginfo@6.0.123-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"product": {
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"product_id": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet6.0-debuginfo@6.0.123-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"product": {
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"product_id": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-runtime-6.0@6.0.23-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"product": {
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"product_id": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-targeting-pack-6.0@6.0.23-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"product": {
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"product_id": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-6.0@6.0.23-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"product": {
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"product_id": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-6.0@6.0.23-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"product": {
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"product_id": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-6.0@6.0.23-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"product": {
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"product_id": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-6.0@6.0.123-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"product": {
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"product_id": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-targeting-pack-6.0@6.0.23-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"product": {
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"product_id": "dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-templates-6.0@6.0.123-1.el9_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dotnet6.0-0:6.0.123-1.el9_2.src",
"product": {
"name": "dotnet6.0-0:6.0.123-1.el9_2.src",
"product_id": "dotnet6.0-0:6.0.123-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet6.0@6.0.123-1.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-0:6.0.123-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-0:6.0.123-1.el9_2.src"
},
"product_reference": "dotnet6.0-0:6.0.123-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64"
},
"product_reference": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x"
},
"product_reference": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64"
},
"product_reference": "dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-0:6.0.123-1.el9_2.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-0:6.0.123-1.el9_2.src"
},
"product_reference": "dotnet6.0-0:6.0.123-1.el9_2.src",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64"
},
"product_reference": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x"
},
"product_reference": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64"
},
"product_reference": "dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-0:6.0.123-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-0:6.0.123-1.el9_2.src",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-16T08:59:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-0:6.0.123-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-0:6.0.123-1.el9_2.src",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5708"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-0:6.0.123-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-0:6.0.123-1.el9_2.src",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-0:6.0.123-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-apphost-pack-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-hostfxr-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-runtime-6.0-debuginfo-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-sdk-6.0-source-built-artifacts-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-targeting-pack-6.0-0:6.0.23-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet-templates-6.0-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-0:6.0.123-1.el9_2.src",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debuginfo-0:6.0.123-1.el9_2.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.s390x",
"CRB-9.2.0.Z.MAIN.EUS:dotnet6.0-debugsource-0:6.0.123-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_5765
Vulnerability from csaf_redhat - Published: 2023-10-17 09:22 - Updated: 2024-12-17 02:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nodejs is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5765",
"url": "https://access.redhat.com/errata/RHSA-2023:5765"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5765.json"
}
],
"title": "Red Hat Security Advisory: nodejs security update",
"tracking": {
"current_release_date": "2024-12-17T02:37:29+00:00",
"generator": {
"date": "2024-12-17T02:37:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:5765",
"initial_release_date": "2023-10-17T09:22:17+00:00",
"revision_history": [
{
"date": "2023-10-17T09:22:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-17T09:22:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T02:37:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-3.el9_2.src",
"product": {
"name": "nodejs-1:16.20.2-3.el9_2.src",
"product_id": "nodejs-1:16.20.2-3.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-3.el9_2?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-3.el9_2.aarch64",
"product": {
"name": "nodejs-1:16.20.2-3.el9_2.aarch64",
"product_id": "nodejs-1:16.20.2-3.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-3.el9_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.aarch64",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.aarch64",
"product_id": "nodejs-full-i18n-1:16.20.2-3.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-3.el9_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:16.20.2-3.el9_2.aarch64",
"product": {
"name": "nodejs-libs-1:16.20.2-3.el9_2.aarch64",
"product_id": "nodejs-libs-1:16.20.2-3.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-3.el9_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.aarch64",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.aarch64",
"product_id": "npm-1:8.19.4-1.16.20.2.3.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.3.el9_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.aarch64",
"product": {
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.aarch64",
"product_id": "nodejs-debugsource-1:16.20.2-3.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-3.el9_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"product_id": "nodejs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-3.el9_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"product": {
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"product_id": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-3.el9_2?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-3.el9_2.ppc64le",
"product": {
"name": "nodejs-1:16.20.2-3.el9_2.ppc64le",
"product_id": "nodejs-1:16.20.2-3.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-3.el9_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.ppc64le",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.ppc64le",
"product_id": "nodejs-full-i18n-1:16.20.2-3.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-3.el9_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:16.20.2-3.el9_2.ppc64le",
"product": {
"name": "nodejs-libs-1:16.20.2-3.el9_2.ppc64le",
"product_id": "nodejs-libs-1:16.20.2-3.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-3.el9_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.ppc64le",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.ppc64le",
"product_id": "npm-1:8.19.4-1.16.20.2.3.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.3.el9_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.ppc64le",
"product": {
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.ppc64le",
"product_id": "nodejs-debugsource-1:16.20.2-3.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-3.el9_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"product_id": "nodejs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-3.el9_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"product": {
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"product_id": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-3.el9_2?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-3.el9_2.x86_64",
"product": {
"name": "nodejs-1:16.20.2-3.el9_2.x86_64",
"product_id": "nodejs-1:16.20.2-3.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-3.el9_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.x86_64",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.x86_64",
"product_id": "nodejs-full-i18n-1:16.20.2-3.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-3.el9_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:16.20.2-3.el9_2.x86_64",
"product": {
"name": "nodejs-libs-1:16.20.2-3.el9_2.x86_64",
"product_id": "nodejs-libs-1:16.20.2-3.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-3.el9_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.x86_64",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.x86_64",
"product_id": "npm-1:8.19.4-1.16.20.2.3.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.3.el9_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.x86_64",
"product": {
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.x86_64",
"product_id": "nodejs-debugsource-1:16.20.2-3.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-3.el9_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"product_id": "nodejs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-3.el9_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"product": {
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"product_id": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-3.el9_2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-libs-1:16.20.2-3.el9_2.i686",
"product": {
"name": "nodejs-libs-1:16.20.2-3.el9_2.i686",
"product_id": "nodejs-libs-1:16.20.2-3.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-3.el9_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.i686",
"product": {
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.i686",
"product_id": "nodejs-debugsource-1:16.20.2-3.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-3.el9_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.i686",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.i686",
"product_id": "nodejs-debuginfo-1:16.20.2-3.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-3.el9_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.i686",
"product": {
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.i686",
"product_id": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-3.el9_2?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-3.el9_2.s390x",
"product": {
"name": "nodejs-1:16.20.2-3.el9_2.s390x",
"product_id": "nodejs-1:16.20.2-3.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-3.el9_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.s390x",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.s390x",
"product_id": "nodejs-full-i18n-1:16.20.2-3.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-3.el9_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:16.20.2-3.el9_2.s390x",
"product": {
"name": "nodejs-libs-1:16.20.2-3.el9_2.s390x",
"product_id": "nodejs-libs-1:16.20.2-3.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-3.el9_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.s390x",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.s390x",
"product_id": "npm-1:8.19.4-1.16.20.2.3.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.3.el9_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.s390x",
"product": {
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.s390x",
"product_id": "nodejs-debugsource-1:16.20.2-3.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-3.el9_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.s390x",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.s390x",
"product_id": "nodejs-debuginfo-1:16.20.2-3.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-3.el9_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.s390x",
"product": {
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.s390x",
"product_id": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-3.el9_2?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:16.20.2-3.el9_2.noarch",
"product": {
"name": "nodejs-docs-1:16.20.2-3.el9_2.noarch",
"product_id": "nodejs-docs-1:16.20.2-3.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-3.el9_2?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-3.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.aarch64"
},
"product_reference": "nodejs-1:16.20.2-3.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-3.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.ppc64le"
},
"product_reference": "nodejs-1:16.20.2-3.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-3.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.s390x"
},
"product_reference": "nodejs-1:16.20.2-3.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-3.el9_2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.src"
},
"product_reference": "nodejs-1:16.20.2-3.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-3.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.x86_64"
},
"product_reference": "nodejs-1:16.20.2-3.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.aarch64"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.i686"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-3.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.ppc64le"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.s390x"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-3.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-3.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.x86_64"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.aarch64"
},
"product_reference": "nodejs-debugsource-1:16.20.2-3.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.i686"
},
"product_reference": "nodejs-debugsource-1:16.20.2-3.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.ppc64le"
},
"product_reference": "nodejs-debugsource-1:16.20.2-3.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.s390x"
},
"product_reference": "nodejs-debugsource-1:16.20.2-3.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-3.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.x86_64"
},
"product_reference": "nodejs-debugsource-1:16.20.2-3.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:16.20.2-3.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-3.el9_2.noarch"
},
"product_reference": "nodejs-docs-1:16.20.2-3.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.aarch64"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-3.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.ppc64le"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-3.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.s390x"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-3.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-3.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.x86_64"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-3.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:16.20.2-3.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.aarch64"
},
"product_reference": "nodejs-libs-1:16.20.2-3.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:16.20.2-3.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.i686"
},
"product_reference": "nodejs-libs-1:16.20.2-3.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:16.20.2-3.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.ppc64le"
},
"product_reference": "nodejs-libs-1:16.20.2-3.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:16.20.2-3.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.s390x"
},
"product_reference": "nodejs-libs-1:16.20.2-3.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:16.20.2-3.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.x86_64"
},
"product_reference": "nodejs-libs-1:16.20.2-3.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.aarch64"
},
"product_reference": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.i686"
},
"product_reference": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.ppc64le"
},
"product_reference": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.s390x"
},
"product_reference": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.x86_64"
},
"product_reference": "nodejs-libs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.aarch64"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.3.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.ppc64le"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.3.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.s390x"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.3.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.3.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.x86_64"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.3.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-3.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-17T09:22:17+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-3.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5765"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-3.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-3.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-3.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.3.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHEA-2023:6741
Vulnerability from csaf_redhat - Published: 2023-11-07 10:07 - Updated: 2026-01-21 05:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for .NET 8.0 is now available for Red Hat Enterprise Linux 9.",
"title": "Topic"
},
{
"category": "general",
"text": ".NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.\n\nBug Fix(es) and Enhancement(s):\n\n* Update .NET 8 to RC1 [rhel-9.3.0.z] (RHEL-4074)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2023:6741",
"url": "https://access.redhat.com/errata/RHEA-2023:6741"
},
{
"category": "external",
"summary": "RHEL-2522",
"url": "https://issues.redhat.com/browse/RHEL-2522"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhea-2023_6741.json"
}
],
"title": "Red Hat Enhancement Advisory: .NET 8.0 bugfix update",
"tracking": {
"current_release_date": "2026-01-21T05:39:57+00:00",
"generator": {
"date": "2026-01-21T05:39:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHEA-2023:6741",
"initial_release_date": "2023-11-07T10:07:12+00:00",
"revision_history": [
{
"date": "2023-11-07T10:07:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-07T10:07:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T05:39:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_id": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-runtime-8.0@8.0.0~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_id": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-targeting-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-host@8.0.0~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-8.0@8.0.0~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-8.0@8.0.0~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0@8.0.100~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0-source-built-artifacts@8.0.100~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-targeting-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-templates-8.0@8.0.100~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_id": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netstandard-targeting-pack-2.1@8.0.100~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet8.0-debugsource@8.0.100~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-host-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0-debuginfo@8.0.100~rc.2-0.1.el9_3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product": {
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_id": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet8.0-debuginfo@8.0.100~rc.2-0.1.el9_3?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_id": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-runtime-8.0@8.0.0~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_id": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-targeting-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-host@8.0.0~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-8.0@8.0.0~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-8.0@8.0.0~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0@8.0.100~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0-source-built-artifacts@8.0.100~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-targeting-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-templates-8.0@8.0.100~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_id": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netstandard-targeting-pack-2.1@8.0.100~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet8.0-debugsource@8.0.100~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-host-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0-debuginfo@8.0.100~rc.2-0.1.el9_3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product": {
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_id": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet8.0-debuginfo@8.0.100~rc.2-0.1.el9_3?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_id": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-runtime-8.0@8.0.0~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_id": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-targeting-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-host@8.0.0~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-8.0@8.0.0~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-8.0@8.0.0~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0@8.0.100~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0-source-built-artifacts@8.0.100~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-targeting-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-templates-8.0@8.0.100~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_id": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netstandard-targeting-pack-2.1@8.0.100~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet8.0-debugsource@8.0.100~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-host-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0-debuginfo@8.0.100~rc.2-0.1.el9_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product": {
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_id": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet8.0-debuginfo@8.0.100~rc.2-0.1.el9_3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product": {
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_id": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-runtime-8.0@8.0.0~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product": {
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_id": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aspnetcore-targeting-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-host@8.0.0~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-8.0@8.0.0~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-8.0@8.0.0~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0@8.0.100~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0-source-built-artifacts@8.0.100~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-targeting-pack-8.0@8.0.0~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-templates-8.0@8.0.100~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product": {
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_id": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netstandard-targeting-pack-2.1@8.0.100~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet8.0-debugsource@8.0.100~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-apphost-pack-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-host-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-hostfxr-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-runtime-8.0-debuginfo@8.0.0~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet-sdk-8.0-debuginfo@8.0.100~rc.2-0.1.el9_3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product": {
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_id": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet8.0-debuginfo@8.0.100~rc.2-0.1.el9_3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dotnet8.0-0:8.0.100~rc.2-0.1.el9_3.src",
"product": {
"name": "dotnet8.0-0:8.0.100~rc.2-0.1.el9_3.src",
"product_id": "dotnet8.0-0:8.0.100~rc.2-0.1.el9_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dotnet8.0@8.0.100~rc.2-0.1.el9_3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x"
},
"product_reference": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x"
},
"product_reference": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-host-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet8.0-0:8.0.100~rc.2-0.1.el9_3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet8.0-0:8.0.100~rc.2-0.1.el9_3.src"
},
"product_reference": "dotnet8.0-0:8.0.100~rc.2-0.1.el9_3.src",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.s390x"
},
"product_reference": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.aarch64"
},
"product_reference": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.ppc64le"
},
"product_reference": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.s390x"
},
"product_reference": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.x86_64"
},
"product_reference": "netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-0:8.0.100~rc.2-0.1.el9_3.src",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T10:07:12+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-0:8.0.100~rc.2-0.1.el9_3.src",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2023:6741"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-0:8.0.100~rc.2-0.1.el9_3.src",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:aspnetcore-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:aspnetcore-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-apphost-pack-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-host-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-host-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-hostfxr-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-runtime-8.0-debuginfo-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-sdk-8.0-source-built-artifacts-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-targeting-pack-8.0-0:8.0.0~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet-templates-8.0-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-0:8.0.100~rc.2-0.1.el9_3.src",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debuginfo-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:dotnet8.0-debugsource-0:8.0.100~rc.2-0.1.el9_3.x86_64",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.aarch64",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.ppc64le",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.s390x",
"AppStream-9.3.0.Z.MAIN:netstandard-targeting-pack-2.1-0:8.0.100~rc.2-0.1.el9_3.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2024_2633
Vulnerability from csaf_redhat - Published: 2024-05-01 01:17 - Updated: 2024-12-17 17:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.\n\nThis updated container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux.\n\nSpace precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/\nrelease_notes/index\n\nAll users of Red Hat Ceph Storage are advised to pull these new images from the Red Hat Ecosystem catalog.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2633",
"url": "https://access.redhat.com/errata/RHSA-2024:2633"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2268486",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268486"
},
{
"category": "external",
"summary": "2272988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272988"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2633.json"
}
],
"title": "Red Hat Security Advisory: updated rhceph-6.1 container image",
"tracking": {
"current_release_date": "2024-12-17T17:33:32+00:00",
"generator": {
"date": "2024-12-17T17:33:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:2633",
"initial_release_date": "2024-05-01T01:17:27+00:00",
"revision_history": [
{
"date": "2024-05-01T01:17:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-05-01T01:17:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T17:33:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ceph Storage 6.1 Tools",
"product": {
"name": "Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ceph_storage:6.1::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ceph Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"product": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"product_id": "rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9\u0026tag=6-90"
}
}
},
{
"category": "product_version",
"name": "rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"product": {
"name": "rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"product_id": "rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-11"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"product": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"product_id": "rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v2.4.0-19"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"product": {
"name": "rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"product_id": "rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9\u0026tag=6-311"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"product": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"product_id": "rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-12"
}
}
},
{
"category": "product_version",
"name": "rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"product": {
"name": "rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"product_id": "rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-57"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"product": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"product_id": "rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9\u0026tag=6-90"
}
}
},
{
"category": "product_version",
"name": "rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"product": {
"name": "rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"product_id": "rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-11"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"product": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"product_id": "rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v2.4.0-19"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"product": {
"name": "rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"product_id": "rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9\u0026tag=6-311"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"product": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"product_id": "rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-12"
}
}
},
{
"category": "product_version",
"name": "rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"product": {
"name": "rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"product_id": "rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-57"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"product": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"product_id": "rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9\u0026tag=6-90"
}
}
},
{
"category": "product_version",
"name": "rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"product": {
"name": "rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"product_id": "rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-11"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"product": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"product_id": "rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v2.4.0-19"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"product": {
"name": "rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"product_id": "rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9\u0026tag=6-311"
}
}
},
{
"category": "product_version",
"name": "rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"product": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"product_id": "rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-12"
}
}
},
{
"category": "product_version",
"name": "rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64",
"product": {
"name": "rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64",
"product_id": "rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-57"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64"
},
"product_reference": "rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le"
},
"product_reference": "rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x"
},
"product_reference": "rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le"
},
"product_reference": "rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x"
},
"product_reference": "rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64"
},
"product_reference": "rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64"
},
"product_reference": "rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le"
},
"product_reference": "rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x"
},
"product_reference": "rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64"
},
"product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x"
},
"product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le"
},
"product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64"
},
"product_reference": "rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le"
},
"product_reference": "rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x"
},
"product_reference": "rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x"
},
"product_reference": "rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le"
},
"product_reference": "rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64 as a component of Red Hat Ceph Storage 6.1 Tools",
"product_id": "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
},
"product_reference": "rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64",
"relates_to_product_reference": "9Base-RHCEPH-6.1-Tools"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-01T01:17:27+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nand\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2633"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
},
{
"cve": "CVE-2023-49569",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2024-01-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2258143"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal vulnerability was discovered in the go library go-git. This issue may allow an attacker to create and amend files across the filesystem when applications are using the default ChrootOS, potentially allowing remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This problem only affects the go implementation and not the original git cli code. Applications using BoundOS or in-memory filesystems are not affected by this issue. Clients should be limited to connect to only trusted git servers to reduce the risk of compromise.\n\nIn OpenShift Container Platform (OCP) the vulnerable github.com/go-git/go-git/v5 Go package is used as a dependency in many components where the vulnerable function is not used, hence the impact by this vulnerability is reduced to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-49569"
},
{
"category": "external",
"summary": "RHBZ#2258143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49569"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-49569",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49569"
},
{
"category": "external",
"summary": "https://github.com/go-git/go-git/security/advisories/GHSA-449p-3h89-pw88",
"url": "https://github.com/go-git/go-git/security/advisories/GHSA-449p-3h89-pw88"
}
],
"release_date": "2024-01-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-01T01:17:27+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nand\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2633"
},
{
"category": "workaround",
"details": "In cases where a bump to the latest version of go-git is not possible, a recommendation to reduce the exposure of this threat is limiting its use to only trust-worthy Git servers.",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients"
},
{
"cve": "CVE-2024-1442",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"discovery_date": "2024-03-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268486"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Grafana, where setting the Grafana API Data Source UID to \u0027*\u0027 Grants Unrestricted Access, grants a user the ability to set the UID to \u0027*\u0027 via the Grafana API poses a severe security risk. This issue enables unauthorized access to read, query, edit, and delete all data sources within the organization. Such unrestricted access can lead to data breaches, manipulation, privacy violations, and compliance issues, emphasizing the critical importance of implementing stringent access controls and monitoring API usage.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grafana: Improper priviledge managent for users with data source permissions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue of allowing users to set the UID to \u0027*\u0027 via the Grafana API presents a moderate severity concern due to its potential impact on data integrity and security within the organization\u0027s Grafana instance. While the risk of unauthorized access and data manipulation is significant, its severity is tempered by the prerequisite of having permission to create a data source in the first place. However, once exploited, this vulnerability enables an attacker to bypass access controls and gain unfettered access to all data sources, allowing them to read, query, edit, and delete sensitive information.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64"
],
"known_not_affected": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-1442"
},
{
"category": "external",
"summary": "RHBZ#2268486",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268486"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-1442",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1442"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-5mxf-42f5-j782",
"url": "https://github.com/advisories/GHSA-5mxf-42f5-j782"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-01T01:17:27+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nand\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2468c33f5af3403df5801d95667767dada47d2a4bfeb8aeda4e920a8e6142fb4_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:ecdabdca39cb872d0cef52b0e5c41b370eb04bd982fdb1b711de9003418a30f2_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:f6fc1dd62eaa7a09e878d2fde3f39f6c32db399d14554412ec09c2eb09a65c7b_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:077eed7e75034ed98d1d47854031e9f99277d6445165b4256c52ba3116c78a99_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:ac73cc9d02509b10de7a49a54762c6ad249aaf079fbd4720e97a2892bb342110_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:fe54e5bfb8d49393d1fac21755ad1017c5b7c34c23dec18563170396f81d15a9_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:0e8fcaf340946dd2881027da80d977066726f5f2bdd454c2b61bcb8ce5aba58b_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:402140159dc4c78dca690a44491a10c51a33fed587d1855b8a781a5e8cf99dfc_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:fba5014ee58c3a8f39bb7967c4a6793e96382f946aff07a0d73038c36db8c1c6_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:6f8c1edbe9702894290cd87044c1a2965d5b70bd534b19dcae6ade98c5c2b0fd_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:7a5642eb5fe90cf6a1b73bedce8afc61f9d7c1d3a45e82ccc56c8ca79a455c45_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:b497b8004a2057c813d95cb35ba30980ef8b40f94d31b9307aa1fc4bbbe35542_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:2cfe8ff27053b918fb4d7bd9d0e393eaed4df688206559dd98ffa604a28bf15c_amd64",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:4f37df3ad28df39a044c0e4575299acaed7301c4bdccd6f608b8775a4a0ad513_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d1b5e1feef37c5212c73fb3ffb4ed51ccafcb1bd9fa99cefc65f937f998852fb_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:414bfdfdd4af59dd1388a407e40e4b523180bac9266088650a63b96a4b70b391_s390x",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9a84f9e7a9999fadd11fd4091f0e29c99742177a71b360cf930b3ff202bfcc2f_ppc64le",
"9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:da2298ff218ec5a827501ef8de531d00e00358c9b1a34a55752fd328fae61b5a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "grafana: Improper priviledge managent for users with data source permissions"
}
]
}
RHSA-2023:5738
Vulnerability from csaf_redhat - Published: 2023-10-16 14:00 - Updated: 2026-01-21 10:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for go-toolset and golang is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nThe golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work [CVE-2023-44487] (CVE-2023-39325)\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\n* golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Midstream dist-git patches (BZ#2223637)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5738",
"url": "https://access.redhat.com/errata/RHSA-2023:5738"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5738.json"
}
],
"title": "Red Hat Security Advisory: go-toolset and golang security and bug fix update",
"tracking": {
"current_release_date": "2026-01-21T10:15:33+00:00",
"generator": {
"date": "2026-01-21T10:15:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:5738",
"initial_release_date": "2023-10-16T14:00:36+00:00",
"revision_history": [
{
"date": "2023-10-16T14:00:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-16T14:00:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T10:15:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.19.13-1.el9_2.src",
"product": {
"name": "golang-0:1.19.13-1.el9_2.src",
"product_id": "golang-0:1.19.13-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.19.13-1.el9_2.src",
"product": {
"name": "go-toolset-0:1.19.13-1.el9_2.src",
"product_id": "go-toolset-0:1.19.13-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.19.13-1.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.19.13-1.el9_2.aarch64",
"product": {
"name": "golang-0:1.19.13-1.el9_2.aarch64",
"product_id": "golang-0:1.19.13-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.19.13-1.el9_2.aarch64",
"product": {
"name": "golang-bin-0:1.19.13-1.el9_2.aarch64",
"product_id": "golang-bin-0:1.19.13-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.19.13-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.19.13-1.el9_2.aarch64",
"product": {
"name": "go-toolset-0:1.19.13-1.el9_2.aarch64",
"product_id": "go-toolset-0:1.19.13-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.19.13-1.el9_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.19.13-1.el9_2.ppc64le",
"product": {
"name": "golang-0:1.19.13-1.el9_2.ppc64le",
"product_id": "golang-0:1.19.13-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.19.13-1.el9_2.ppc64le",
"product": {
"name": "golang-bin-0:1.19.13-1.el9_2.ppc64le",
"product_id": "golang-bin-0:1.19.13-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.19.13-1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.19.13-1.el9_2.ppc64le",
"product": {
"name": "go-toolset-0:1.19.13-1.el9_2.ppc64le",
"product_id": "go-toolset-0:1.19.13-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.19.13-1.el9_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.19.13-1.el9_2.x86_64",
"product": {
"name": "golang-0:1.19.13-1.el9_2.x86_64",
"product_id": "golang-0:1.19.13-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.19.13-1.el9_2.x86_64",
"product": {
"name": "golang-bin-0:1.19.13-1.el9_2.x86_64",
"product_id": "golang-bin-0:1.19.13-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.19.13-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.19.13-1.el9_2.x86_64",
"product": {
"name": "golang-race-0:1.19.13-1.el9_2.x86_64",
"product_id": "golang-race-0:1.19.13-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.19.13-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.19.13-1.el9_2.x86_64",
"product": {
"name": "go-toolset-0:1.19.13-1.el9_2.x86_64",
"product_id": "go-toolset-0:1.19.13-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.19.13-1.el9_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.19.13-1.el9_2.s390x",
"product": {
"name": "golang-0:1.19.13-1.el9_2.s390x",
"product_id": "golang-0:1.19.13-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.19.13-1.el9_2.s390x",
"product": {
"name": "golang-bin-0:1.19.13-1.el9_2.s390x",
"product_id": "golang-bin-0:1.19.13-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.19.13-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.19.13-1.el9_2.s390x",
"product": {
"name": "go-toolset-0:1.19.13-1.el9_2.s390x",
"product_id": "go-toolset-0:1.19.13-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.19.13-1.el9_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.19.13-1.el9_2.noarch",
"product": {
"name": "golang-docs-0:1.19.13-1.el9_2.noarch",
"product_id": "golang-docs-0:1.19.13-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.19.13-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.19.13-1.el9_2.noarch",
"product": {
"name": "golang-misc-0:1.19.13-1.el9_2.noarch",
"product_id": "golang-misc-0:1.19.13-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.19.13-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.19.13-1.el9_2.noarch",
"product": {
"name": "golang-src-0:1.19.13-1.el9_2.noarch",
"product_id": "golang-src-0:1.19.13-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.19.13-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.19.13-1.el9_2.noarch",
"product": {
"name": "golang-tests-0:1.19.13-1.el9_2.noarch",
"product_id": "golang-tests-0:1.19.13-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.19.13-1.el9_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.19.13-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64"
},
"product_reference": "go-toolset-0:1.19.13-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.19.13-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le"
},
"product_reference": "go-toolset-0:1.19.13-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.19.13-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x"
},
"product_reference": "go-toolset-0:1.19.13-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.19.13-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src"
},
"product_reference": "go-toolset-0:1.19.13-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.19.13-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64"
},
"product_reference": "go-toolset-0:1.19.13-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64"
},
"product_reference": "golang-0:1.19.13-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le"
},
"product_reference": "golang-0:1.19.13-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x"
},
"product_reference": "golang-0:1.19.13-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src"
},
"product_reference": "golang-0:1.19.13-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64"
},
"product_reference": "golang-0:1.19.13-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.19.13-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64"
},
"product_reference": "golang-bin-0:1.19.13-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.19.13-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le"
},
"product_reference": "golang-bin-0:1.19.13-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.19.13-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x"
},
"product_reference": "golang-bin-0:1.19.13-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.19.13-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64"
},
"product_reference": "golang-bin-0:1.19.13-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.19.13-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch"
},
"product_reference": "golang-docs-0:1.19.13-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.19.13-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch"
},
"product_reference": "golang-misc-0:1.19.13-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.19.13-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64"
},
"product_reference": "golang-race-0:1.19.13-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.19.13-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch"
},
"product_reference": "golang-src-0:1.19.13-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.19.13-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
},
"product_reference": "golang-tests-0:1.19.13-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-29406",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2023-07-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2222167"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang, where it is vulnerable to HTTP header injection caused by improper content validation of the Host header by the HTTP/1 client. A remote attacker can inject arbitrary HTTP headers by persuading a victim to visit a specially crafted Web page. This flaw allows the attacker to conduct various attacks against the vulnerable system, including Cross-site scripting, cache poisoning, or session hijacking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: insufficient sanitization of Host header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
],
"known_not_affected": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29406"
},
{
"category": "external",
"summary": "RHBZ#2222167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0",
"url": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0"
}
],
"release_date": "2023-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-16T14:00:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5738"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: insufficient sanitization of Host header"
},
{
"cve": "CVE-2023-29409",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-08-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228743"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
],
"known_not_affected": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29409"
},
{
"category": "external",
"summary": "RHBZ#2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409"
},
{
"category": "external",
"summary": "https://go.dev/cl/515257",
"url": "https://go.dev/cl/515257"
},
{
"category": "external",
"summary": "https://go.dev/issue/61460",
"url": "https://go.dev/issue/61460"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ",
"url": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-1987",
"url": "https://pkg.go.dev/vuln/GO-2023-1987"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-16T14:00:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5738"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys"
},
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
],
"known_not_affected": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-16T14:00:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5738"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
],
"known_not_affected": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-16T14:00:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5738"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:go-toolset-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.src",
"AppStream-9.2.0.Z.MAIN.EUS:golang-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:golang-bin-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-docs-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-misc-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-race-0:1.19.13-1.el9_2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:golang-src-0:1.19.13-1.el9_2.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:golang-tests-0:1.19.13-1.el9_2.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_5541
Vulnerability from csaf_redhat - Published: 2023-10-20 04:11 - Updated: 2024-12-18 04:44Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Logging Subsystem 5.6.12 - Red Hat OpenShift\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Logging Subsystem 5.6.12 - Red Hat OpenShift\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-39325)\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nNOTE: A Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\n* tough-cookie: prototype pollution in cookie memstore (CVE-2023-26136)\n\n* golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)\n\n* golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5541",
"url": "https://access.redhat.com/errata/RHSA-2023:5541"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "2222167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222167"
},
{
"category": "external",
"summary": "2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "LOG-4570",
"url": "https://issues.redhat.com/browse/LOG-4570"
},
{
"category": "external",
"summary": "LOG-4579",
"url": "https://issues.redhat.com/browse/LOG-4579"
},
{
"category": "external",
"summary": "LOG-4687",
"url": "https://issues.redhat.com/browse/LOG-4687"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5541.json"
}
],
"title": "Red Hat Security Advisory: Logging Subsystem 5.6.12 - Red Hat OpenShift security update",
"tracking": {
"current_release_date": "2024-12-18T04:44:33+00:00",
"generator": {
"date": "2024-12-18T04:44:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:5541",
"initial_release_date": "2023-10-20T04:11:50+00:00",
"revision_history": [
{
"date": "2023-10-20T04:11:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-20T04:11:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T04:44:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHOL 5.6 for RHEL 8",
"product": {
"name": "RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.6::el8"
}
}
}
],
"category": "product_family",
"name": "logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.6.12-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.6.12-19"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.6.12-8"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.6.12-21"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-438"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-176"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-420"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-370"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-190"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-192"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-400"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.9.2-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"product_id": "openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-113"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.6.12-8"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"product": {
"name": "openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"product_id": "openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v5.6.12-22"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.6.12-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-357"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-163"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.6.12-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.6.12-8"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-438"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-176"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-420"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-370"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-190"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-192"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-400"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.9.2-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"product_id": "openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-113"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.6.12-8"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.6.12-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-357"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-163"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.6.12-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.6.12-8"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-438"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-176"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-420"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-370"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-190"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-192"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-400"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.9.2-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"product_id": "openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-113"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.6.12-8"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.6.12-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-357"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-163"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.6.12-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.6.12-8"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-438"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-176"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-420"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-370"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-190"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-192"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-400"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.9.2-2"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64",
"product_id": "openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-113"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.6.12-8"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.6.12-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-357"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-163"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64"
},
"product_reference": "openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"relates_to_product_reference": "8Base-RHOL-5.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64 as a component of RHOL 5.6 for RHEL 8",
"product_id": "8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64",
"relates_to_product_reference": "8Base-RHOL-5.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Kokorin Vsevolod"
]
}
],
"cve": "CVE-2023-26136",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2023-07-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219310"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tough-cookie: prototype pollution in cookie memstore",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26136"
},
{
"category": "external",
"summary": "RHBZ#2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e",
"url": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/issues/282",
"url": "https://github.com/salesforce/tough-cookie/issues/282"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3",
"url": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3"
},
{
"category": "external",
"summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873",
"url": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873"
}
],
"release_date": "2023-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-20T04:11:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5541"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tough-cookie: prototype pollution in cookie memstore"
},
{
"cve": "CVE-2023-29406",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2023-07-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2222167"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang, where it is vulnerable to HTTP header injection caused by improper content validation of the Host header by the HTTP/1 client. A remote attacker can inject arbitrary HTTP headers by persuading a victim to visit a specially crafted Web page. This flaw allows the attacker to conduct various attacks against the vulnerable system, including Cross-site scripting, cache poisoning, or session hijacking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: insufficient sanitization of Host header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64"
],
"known_not_affected": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29406"
},
{
"category": "external",
"summary": "RHBZ#2222167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0",
"url": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0"
}
],
"release_date": "2023-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-20T04:11:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5541"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: insufficient sanitization of Host header"
},
{
"cve": "CVE-2023-29409",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-08-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228743"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64"
],
"known_not_affected": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29409"
},
{
"category": "external",
"summary": "RHBZ#2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409"
},
{
"category": "external",
"summary": "https://go.dev/cl/515257",
"url": "https://go.dev/cl/515257"
},
{
"category": "external",
"summary": "https://go.dev/issue/61460",
"url": "https://go.dev/issue/61460"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ",
"url": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-1987",
"url": "https://pkg.go.dev/vuln/GO-2023-1987"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-20T04:11:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5541"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys"
},
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64"
],
"known_not_affected": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-20T04:11:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5541"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-20T04:11:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5541"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.6:openshift-logging/cluster-logging-operator-bundle@sha256:02c4a20e1f2b0678afe4ea0757933ce581ef66e6b189622aea7dc0fa91e6c18c_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:556e2c39c0eebd2e8a4d361d40221fa8cf0e9bf7db66dcf2bd2f32576240d94b_amd64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:64d3a93c2adbca869845ea59edfbef2675658bd15fd22dfc1681b57809d3269c_arm64",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:a697fe3d581606f0da267205636c94e0dd7076fdf562fe9d4f0332ec0267f880_s390x",
"8Base-RHOL-5.6:openshift-logging/cluster-logging-rhel8-operator@sha256:f8553bf9f5a75c089cdf5a26f8853e6f4488c19ef2a8dc1e0ebc96e4aab0384f_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-operator-bundle@sha256:369d45c783651c6e07dfd721fa43025800b263da8e1fdbbc75b296686426e840_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:26f58db9cb18dfe0eb7a3478a7bb86c87efabe32d98dcf74bc34226a09ea6f0e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:938ac92e58ab4fd377219899c6f3c25f41a58260f078e44b371d91964083d96a_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:c67b4fadb575fc60d60cc3307da75f2fa3e5c4760e572072308a506e4e271ab1_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-proxy-rhel8@sha256:ce5fc5a37453626de4bcb9a05d3849ef7da0722bfc8f0fecfc1f693cf6b5deff_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:2a87c3b6888c57d813169da3ae06aa5bcac1ac916cdc62da3c492928d8eab187_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:34a393916466f1d4544cbe4d75936147c4bfc4e0246bee0faebc5c285f26d30d_arm64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:358c663dbc3c6b0ee31a4b2665c79ff7b826ba6b72c21db62d186a6da09b04c4_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch-rhel8-operator@sha256:7a9678d49d25ec0afbcab3c98a3d26d2eeda04a0ece3a833d91dde818f0dde22_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:8e62859531fcb8dd6b054a76c4bc95b62ff62bcbe69fe18f132689a203168bc8_s390x",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:92ab2dde35f2f59c3a8ce7b8b12f5703a7a214e83ca5cc13673d0c8ad373f02e_amd64",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:caeeb679701abcbb9612b77ef0975575cf31c96b74bfc06553d61140a3f52bb7_ppc64le",
"8Base-RHOL-5.6:openshift-logging/elasticsearch6-rhel8@sha256:cd9a57aad90fdec4fef3b0f9b31df96c12bd7fe97cad90f9a1de79e6b0af4bbb_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:b822207e2e70c989cf98d9e5a810e85034a8a1fd2130451e525ce4a804dd1727_s390x",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ec56cae824197805c3287f57854343d2d26caa0b192a009c966d28c32f0d0d92_ppc64le",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:fc638d1f8ff0f079ea1f5cfa3a9938dc06374ca4e6cd24f92ba62b7d03fd6963_arm64",
"8Base-RHOL-5.6:openshift-logging/eventrouter-rhel8@sha256:ff509532db6b7e2d3a44fac2cf9b63687aa8bfbaab46d7a5f9d58be192475818_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:149d75b8f4f523c86122176935c63b96305f6eb308e74eea9fa6651c8e75d239_amd64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:3038086e3dbfab1e3070cdeeb7968e863ab4b1012d161ed263e93b153ae2223b_s390x",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:816908f1ac923336e8e3b87129af40271bde545e12b3385186425038f1b14991_arm64",
"8Base-RHOL-5.6:openshift-logging/fluentd-rhel8@sha256:e489da61d05557fba2718fd3e75b7ba50c51c173f43088334db7f3c993748711_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0958ffa84bed51e99177837ac672324e5a8c1b20535d8110a3bbabe3f952073e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:0c4ea44d09b21a915c3ecc17c9a50ba22d71ed06b0cc4ba1d8bfbe1ced426e47_arm64",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:20b6b6aef51ef6cabe133e53dcc1d6665ff8fae0fab4d56ecd6998ca88554773_s390x",
"8Base-RHOL-5.6:openshift-logging/kibana6-rhel8@sha256:57b608727de6a22f2c39c138d184b4d2e9a1e62b2206fbcab290aeef2802e520_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:1646d63e4b9fa7d45f8fc9d1e8cec3cccbed9ba850f3ac07dc75b18f416c580f_s390x",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:94471501cf396d9d298e9dfee95ed7496e0ec8767eb80bab0ea809cb4e16b878_amd64",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:a2bd4a83b30b2b9e88e8581784e3e901d564d576ba3a58824cd203779ccc9e80_ppc64le",
"8Base-RHOL-5.6:openshift-logging/log-file-metric-exporter-rhel8@sha256:b442de2cb36a3a26b3d8b32d953d83d01c4cd5b659f974e1f781fbb5aaef5977_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:1cac7ceee19cd185658324643c9a81d055d22aa238a28986c76594153c79b422_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:4f8f194cc5827f05a969960937e9993528ad030c32d64c7a8d95bcb8ad1bb27a_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:cb78249fdad4f2cff00011a9863f40f0749c2f3b4093a322f9590008e62c06c6_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-curator5-rhel8@sha256:f09e73392f894fd4f9c38595e617dd4eebabb698d8e1ad0f3ac4e080c37b1f12_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:47df30d450dbc2b26cf828f2208832ddcba75719cef9486d047e4b2bfb2c61a8_amd64",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:aea6196bddef8110c0d9282d6e84a7e8cdee066fab8ba3607dacb8425b458819_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:af7c029f15eacd2b65a99271538c68d9b2dcd5c25dbfabadd0e9f8bb2911d827_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-loki-rhel8@sha256:f4558c73e630c043e8ffebd92bfbc805d13a644b19e5e43d35979b7942225b98_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:42223f3fb6d55d6d9155f110b90323965eaf68263d51c485114784a651be8e5e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:50230e9829718254fc51d844e0305978b694354bda4b798fb5066ca3c182d323_s390x",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:79590fd5063ffa0245d96cec02dc4ce257244a431e213ecbe38462e86536b859_arm64",
"8Base-RHOL-5.6:openshift-logging/logging-view-plugin-rhel8@sha256:fd9b30d940cdc8b281fa4a46e8a22f946571e7e72695fef9cfa02c4337e74dc0_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-operator-bundle@sha256:62f04228cf7e9abc40efbd69b6dcd0b6d421834b520753194105010cc35e810c_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:260731d610f37fa0072760f09d460d04fd3a1359d24a2218918412bc1a93947b_arm64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:347cb504d7b382c241a238d1fffc91b5905121c4fe6c976356c46909161b9ced_amd64",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5c0c41173e8c288341859dda8e9c982fba297e2e6c616b953a04ea4280f8caa_ppc64le",
"8Base-RHOL-5.6:openshift-logging/loki-rhel8-operator@sha256:c5e123a5c5d637ff9fb0327c03351e46f14b0d774b484fd045d51df058550d3d_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:1da817a84816082f56d2f3bea2f4a680b8e8cc4fe7ff95e311b44e1b5f1f5f0a_s390x",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:a40f0f1402d912aa12329e0ee3f4d8084337a376f72f1e0b5e45a4dac44ac848_arm64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:ea81838d5b7a63e28ad7e20113253a701063d8d723137681bf11afd801c69f6f_amd64",
"8Base-RHOL-5.6:openshift-logging/lokistack-gateway-rhel8@sha256:f7c8b8251566fadb3396dfee110b6995e9d2ca27614a3b51f148f78fe5b51b50_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:01d2e3c8016742d49a9fe1cf7d62c6826dfc8f805babdc4c32e1407c3c8ae6c2_amd64",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:5b8bc65ad9760c2bcabac5ebf72f2a256271a4c1173871742bf8f817c6ce0478_ppc64le",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:b76cb34507d54f963da41744b614b83bb7cc031942e7252452c3b299dcc0f530_s390x",
"8Base-RHOL-5.6:openshift-logging/opa-openshift-rhel8@sha256:e9fc83b6a9a40c2af4dd8a8454d8ca9e3a3bb96fdb290427d3a0c9cb753e91f4_arm64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:10f88bb7c978c24555def7bf4d7fd35dba3d1b5ffdc32fde359b175fc8d8b34e_ppc64le",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:7e46ef2e749e3896a86af16744c1c3542ff8a6d0467793af27aedb0fdbc9ee4a_s390x",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:a9f8b40acd19609ee9c9bc85a4f2cdec9aa4c8c786b62ad94e33c8ea451de961_amd64",
"8Base-RHOL-5.6:openshift-logging/vector-rhel8@sha256:ebff04a36feae157572fdd32ce2cc045c504b850c0b9f471d381676da314dd97_arm64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_5711
Vulnerability from csaf_redhat - Published: 2023-10-16 09:00 - Updated: 2024-12-17 02:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nginx is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. \n\nSecurity Fix(es):\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5711",
"url": "https://access.redhat.com/errata/RHSA-2023:5711"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5711.json"
}
],
"title": "Red Hat Security Advisory: nginx security update",
"tracking": {
"current_release_date": "2024-12-17T02:37:03+00:00",
"generator": {
"date": "2024-12-17T02:37:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:5711",
"initial_release_date": "2023-10-16T09:00:03+00:00",
"revision_history": [
{
"date": "2023-10-16T09:00:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-16T09:00:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T02:37:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-devel@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-debugsource@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-core-debuginfo@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-debuginfo@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-image-filter-debuginfo@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-perl-debuginfo@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-xslt-filter-debuginfo@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-mail-debuginfo@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-stream-debuginfo@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-core@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-image-filter@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-perl@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-xslt-filter@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-mail@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"product": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"product_id": "nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-stream@1.20.1-14.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-devel@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-debugsource@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-core-debuginfo@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-debuginfo@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-image-filter-debuginfo@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-perl-debuginfo@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-xslt-filter-debuginfo@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-mail-debuginfo@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-stream-debuginfo@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-core@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-image-filter@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-perl@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-xslt-filter@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-mail@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"product": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"product_id": "nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-stream@1.20.1-14.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-devel@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-debugsource@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-core-debuginfo@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-debuginfo@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-image-filter-debuginfo@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-perl-debuginfo@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-xslt-filter-debuginfo@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-mail-debuginfo@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-stream-debuginfo@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-core@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-image-filter@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-perl@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-xslt-filter@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-mail@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"product": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"product_id": "nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-stream@1.20.1-14.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-devel@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-debugsource@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-core-debuginfo@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-debuginfo@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-image-filter-debuginfo@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-perl-debuginfo@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-xslt-filter-debuginfo@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-mail-debuginfo@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-stream-debuginfo@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-core-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-core-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-core@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-image-filter@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-perl@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-http-xslt-filter@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-mail@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"product": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"product_id": "nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-mod-stream@1.20.1-14.el9_2.1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nginx-1:1.20.1-14.el9_2.1.src",
"product": {
"name": "nginx-1:1.20.1-14.el9_2.1.src",
"product_id": "nginx-1:1.20.1-14.el9_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx@1.20.1-14.el9_2.1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"product": {
"name": "nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"product_id": "nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-all-modules@1.20.1-14.el9_2.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"product": {
"name": "nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"product_id": "nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nginx-filesystem@1.20.1-14.el9_2.1?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1:1.20.1-14.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.src"
},
"product_reference": "nginx-1:1.20.1-14.el9_2.1.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-all-modules-1:1.20.1-14.el9_2.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-all-modules-1:1.20.1-14.el9_2.1.noarch"
},
"product_reference": "nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-core-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-filesystem-1:1.20.1-14.el9_2.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-filesystem-1:1.20.1-14.el9_2.1.noarch"
},
"product_reference": "nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1:1.20.1-14.el9_2.1.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.src"
},
"product_reference": "nginx-1:1.20.1-14.el9_2.1.src",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-all-modules-1:1.20.1-14.el9_2.1.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-all-modules-1:1.20.1-14.el9_2.1.noarch"
},
"product_reference": "nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-core-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-filesystem-1:1.20.1-14.el9_2.1.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-filesystem-1:1.20.1-14.el9_2.1.noarch"
},
"product_reference": "nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64"
},
"product_reference": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le"
},
"product_reference": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x"
},
"product_reference": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
},
"product_reference": "nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.src",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-16T09:00:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.src",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5711"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.src",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.src",
"CRB-9.2.0.Z.MAIN.EUS:nginx-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-all-modules-1:1.20.1-14.el9_2.1.noarch",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-core-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-debugsource-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-filesystem-1:1.20.1-14.el9_2.1.noarch",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-devel-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-image-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-perl-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-http-xslt-filter-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-mail-debuginfo-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-1:1.20.1-14.el9_2.1.x86_64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.aarch64",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.ppc64le",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.s390x",
"CRB-9.2.0.Z.MAIN.EUS:nginx-mod-stream-debuginfo-1:1.20.1-14.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_7687
Vulnerability from csaf_redhat - Published: 2023-12-13 00:13 - Updated: 2024-12-18 04:58Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.13.26 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.13.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.13.26. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2023:7689\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive\nwork (CVE-2023-44487) (CVE-2023-39325)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nAll OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7687",
"url": "https://access.redhat.com/errata/RHSA-2023:7687"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "OCPBUGS-22997",
"url": "https://issues.redhat.com/browse/OCPBUGS-22997"
},
{
"category": "external",
"summary": "OCPBUGS-23497",
"url": "https://issues.redhat.com/browse/OCPBUGS-23497"
},
{
"category": "external",
"summary": "OCPBUGS-23567",
"url": "https://issues.redhat.com/browse/OCPBUGS-23567"
},
{
"category": "external",
"summary": "OCPBUGS-23978",
"url": "https://issues.redhat.com/browse/OCPBUGS-23978"
},
{
"category": "external",
"summary": "OCPBUGS-24240",
"url": "https://issues.redhat.com/browse/OCPBUGS-24240"
},
{
"category": "external",
"summary": "OCPBUGS-24263",
"url": "https://issues.redhat.com/browse/OCPBUGS-24263"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7687.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.13.26 bug fix and security update",
"tracking": {
"current_release_date": "2024-12-18T04:58:50+00:00",
"generator": {
"date": "2024-12-18T04:58:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:7687",
"initial_release_date": "2023-12-13T00:13:20+00:00",
"revision_history": [
{
"date": "2023-12-13T00:13:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-12-13T00:13:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T04:58:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.13",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.13::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.13",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.13::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"product": {
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"product_id": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-rhel9-operator\u0026tag=v4.13.0-202311300032.p0.g05a417a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"product": {
"name": "openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"product_id": "openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.13.0-202312040731.p0.gc1c7010.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"product": {
"name": "openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"product_id": "openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.13.0-202312011031.p0.g7dfc52e.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"product": {
"name": "openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"product_id": "openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.13.0-202312011031.p0.g7dfc52e.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"product": {
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"product_id": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-agent-installer-node-agent-rhel8\u0026tag=v4.13.0-202311291731.p0.gc561104.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"product": {
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"product_id": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-apiserver-network-proxy-rhel8\u0026tag=v4.13.0-202312011907.p0.g3362d67.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"product": {
"name": "openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"product_id": "openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift-rhel8\u0026tag=v4.13.0-202312051150.p0.g24cdafd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"product": {
"name": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"product_id": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ibmcloud-cluster-api-controllers-rhel8\u0026tag=v4.13.0-202311300208.p0.gc4441f1.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.13.0-202312061309.p0.gdff6a1c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"product_id": "openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.13.0-202312040333.p0.g403f727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"product_id": "openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.13.0-202312050750.p0.gbf629e3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.13.0-202312010109.p0.g32b801b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"product_id": "openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.13.0-202312011907.p0.g073feda.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.13.0-202312040608.p0.g6c07330.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"product": {
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"product_id": "openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes-rhel9\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"product": {
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"product_id": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes-microshift-rhel9\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"product": {
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"product_id": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-rhel9-operator\u0026tag=v4.13.0-202311300032.p0.g05a417a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"product": {
"name": "openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"product_id": "openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel9\u0026tag=v4.13.0-202312041532.p0.g1585b09.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"product": {
"name": "openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"product_id": "openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.13.0-202312040731.p0.gc1c7010.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"product": {
"name": "openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"product_id": "openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.13.0-202312011031.p0.g7dfc52e.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"product": {
"name": "openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"product_id": "openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.13.0-202312011031.p0.g7dfc52e.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"product": {
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"product_id": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-agent-installer-node-agent-rhel8\u0026tag=v4.13.0-202311291731.p0.gc561104.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"product": {
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"product_id": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-apiserver-network-proxy-rhel8\u0026tag=v4.13.0-202312011907.p0.g3362d67.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"product": {
"name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"product_id": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-cloud-controller-manager-rhel8\u0026tag=v4.13.0-202312040333.p0.g507fea9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"product": {
"name": "openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"product_id": "openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift-rhel8\u0026tag=v4.13.0-202312051150.p0.g24cdafd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"product": {
"name": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"product_id": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ibmcloud-cluster-api-controllers-rhel8\u0026tag=v4.13.0-202311300208.p0.gc4441f1.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.13.0-202312061309.p0.gdff6a1c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"product_id": "openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.13.0-202312040333.p0.g403f727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"product_id": "openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.13.0-202312050750.p0.gbf629e3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.13.0-202312010109.p0.g32b801b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"product_id": "openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.13.0-202312011907.p0.g073feda.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.13.0-202312040608.p0.g6c07330.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"product": {
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"product_id": "openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes-rhel9\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"product": {
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"product_id": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes-microshift-rhel9\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"product": {
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"product_id": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-rhel9-operator\u0026tag=v4.13.0-202311300032.p0.g05a417a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"product": {
"name": "openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"product_id": "openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.13.0-202312040731.p0.gc1c7010.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"product": {
"name": "openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"product_id": "openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.13.0-202312011031.p0.g7dfc52e.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"product": {
"name": "openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"product_id": "openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.13.0-202312011031.p0.g7dfc52e.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"product": {
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"product_id": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-agent-installer-node-agent-rhel8\u0026tag=v4.13.0-202311291731.p0.gc561104.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"product": {
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"product_id": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-apiserver-network-proxy-rhel8\u0026tag=v4.13.0-202312011907.p0.g3362d67.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"product": {
"name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"product_id": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-cloud-controller-manager-rhel8\u0026tag=v4.13.0-202312040333.p0.g507fea9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"product": {
"name": "openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"product_id": "openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift-rhel8\u0026tag=v4.13.0-202312051150.p0.g24cdafd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"product": {
"name": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"product_id": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ibmcloud-cluster-api-controllers-rhel8\u0026tag=v4.13.0-202311300208.p0.gc4441f1.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.13.0-202312061309.p0.gdff6a1c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"product_id": "openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.13.0-202312040333.p0.g403f727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"product_id": "openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.13.0-202312050750.p0.gbf629e3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.13.0-202312010109.p0.g32b801b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"product_id": "openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.13.0-202312011907.p0.g073feda.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.13.0-202312040608.p0.g6c07330.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"product": {
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"product_id": "openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes-rhel9\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"product": {
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"product_id": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes-microshift-rhel9\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"product": {
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"product_id": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-rhel9-operator\u0026tag=v4.13.0-202311300032.p0.g05a417a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"product": {
"name": "openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"product_id": "openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel9\u0026tag=v4.13.0-202312041532.p0.g1585b09.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"product": {
"name": "openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"product_id": "openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.13.0-202312040731.p0.gc1c7010.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"product": {
"name": "openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"product_id": "openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.13.0-202312011031.p0.g7dfc52e.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"product": {
"name": "openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"product_id": "openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.13.0-202312011031.p0.g7dfc52e.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"product": {
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"product_id": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-agent-installer-node-agent-rhel8\u0026tag=v4.13.0-202311291731.p0.gc561104.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"product": {
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"product_id": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-apiserver-network-proxy-rhel8\u0026tag=v4.13.0-202312011907.p0.g3362d67.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"product": {
"name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"product_id": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-cloud-controller-manager-rhel8\u0026tag=v4.13.0-202312040333.p0.g507fea9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"product": {
"name": "openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"product_id": "openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift-rhel8\u0026tag=v4.13.0-202312051150.p0.g24cdafd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.13.0-202312061309.p0.gdff6a1c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"product_id": "openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.13.0-202312040333.p0.g403f727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"product_id": "openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.13.0-202312050750.p0.gbf629e3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.13.0-202312010109.p0.g32b801b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"product_id": "openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.13.0-202312011907.p0.g073feda.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.13.0-202312040608.p0.g6c07330.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"product": {
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"product_id": "openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes-rhel9\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"product": {
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"product_id": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes-microshift-rhel9\u0026tag=v4.13.0-202312011907.p0.gbc1c4dc.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x"
},
"product_reference": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64"
},
"product_reference": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64"
},
"product_reference": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le"
},
"product_reference": "openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x"
},
"product_reference": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64"
},
"product_reference": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le"
},
"product_reference": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64"
},
"product_reference": "openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le"
},
"product_reference": "openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64"
},
"product_reference": "openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x"
},
"product_reference": "openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64"
},
"product_reference": "openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64"
},
"product_reference": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le"
},
"product_reference": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64"
},
"product_reference": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x"
},
"product_reference": "openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le"
},
"product_reference": "openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64"
},
"product_reference": "openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64"
},
"product_reference": "openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x"
},
"product_reference": "openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64"
},
"product_reference": "openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le"
},
"product_reference": "openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64"
},
"product_reference": "openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x"
},
"product_reference": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le"
},
"product_reference": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64"
},
"product_reference": "openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64"
},
"product_reference": "openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64"
},
"product_reference": "openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x"
},
"product_reference": "openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le"
},
"product_reference": "openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64"
},
"product_reference": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x"
},
"product_reference": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64"
},
"product_reference": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le"
},
"product_reference": "openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64"
},
"product_reference": "openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64"
},
"product_reference": "openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64"
},
"product_reference": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le"
},
"product_reference": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x"
},
"product_reference": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64"
},
"product_reference": "openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64"
},
"product_reference": "openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64"
},
"product_reference": "openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le"
},
"product_reference": "openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x"
},
"product_reference": "openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64"
],
"known_not_affected": [
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-13T00:13:20+00:00",
"details": "For OpenShift Container Platform 4.13 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\n https://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\n The sha values for the release are\n\n (For x86_64 architecture)\n The image digest is sha256:dece136ed888653cae20c2832b9e94de7c7ab24e34cddf49d5d284f41d7b61b1\n\n (For s390x architecture)\n The image digest is sha256:bfbdafa2c6a2802bf2b66c8e1b5bf9fadfe540c9739da8daa666d69a1890c31f\n\n (For ppc64le architecture)\n The image digest is sha256:afeb405b91d2e79d752beef15e7f63bc54519e7371d508a47f8570cff34b384c\n\n (For aarch64 architecture)\n The image digest is sha256:bfc4eaa2419cc0a214789137cd2ffb56403f35ec14ec11937858e2c88824587d\n\nAll OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7687"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64"
],
"known_not_affected": [
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-13T00:13:20+00:00",
"details": "For OpenShift Container Platform 4.13 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\n https://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\n The sha values for the release are\n\n (For x86_64 architecture)\n The image digest is sha256:dece136ed888653cae20c2832b9e94de7c7ab24e34cddf49d5d284f41d7b61b1\n\n (For s390x architecture)\n The image digest is sha256:bfbdafa2c6a2802bf2b66c8e1b5bf9fadfe540c9739da8daa666d69a1890c31f\n\n (For ppc64le architecture)\n The image digest is sha256:afeb405b91d2e79d752beef15e7f63bc54519e7371d508a47f8570cff34b384c\n\n (For aarch64 architecture)\n The image digest is sha256:bfc4eaa2419cc0a214789137cd2ffb56403f35ec14ec11937858e2c88824587d\n\nAll OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7687"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:87161107ecf98404c8a16253f70cb1161f912631e7071e9e8a5f23abc8cb1c81_amd64",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:bd0f5b09a69991141ac453788e1bf82f929755add56ff0b016f59dc5f9ee4069_ppc64le",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:d896d49b3ad7a06348fb4c901a43e57106d8964e6b7a6c41cbc51a591a693ce5_s390x",
"8Base-RHOSE-4.13:openshift4/network-tools-rhel8@sha256:e09e7d18dbd03548965cf7e2452ab240819a04912c395c307ea7ac83b8234407_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:9111bf8e1272fd77d44db6ca15c4c7c82df530dbd651f6c0b880dc06b2259b15_s390x",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:d3a0c24bcb4ce2061d3cf47fa4ea07607610447bdf8719ba31ad96b2867909a6_arm64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:db2d757db4c605c4f91d949a01b9de771ff4b80005dd46c472d0cb2af56b12e0_amd64",
"8Base-RHOSE-4.13:openshift4/ose-agent-installer-node-agent-rhel8@sha256:eaece5585ade7ea69944930312f4b7316a3cb9efce38336edb53e8d2404e4373_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:02770a527d1b5278a849109640666c8da368f7db0dceb7e71410f17a18d39511_s390x",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:0ae007dd4af28973b1beca810365c4d0b958e27d1e6cdd99638ac09b869ee915_arm64",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:63735dba9f371806527f425d20c748e6e46b16847cdf5ee2ea95739676c5bd6f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-apiserver-network-proxy-rhel8@sha256:867f3d534eb4a6bcc5677ad1b2dacb9745d945019a2c441c0fdf27332770dd3f_amd64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:08c0702b76afcd36918a08363f923cb58306c989e19a220fcf912f064553768d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:52ee0a106024b1d7868e0dc618d713696cb12b6d3c450933316f2cf01c456649_arm64",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:5b2b23814f522b36dad0538790b4a67674503f6a9b9a07c285ba801da5f6fd6c_s390x",
"8Base-RHOSE-4.13:openshift4/ose-console@sha256:d8a3620411240d33e8923fa3cfa51bfc7db3c4d87d9bbb1a3460bc68f61f56be_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:0a7942473533bff70f8ebda2d93910d63b4dbb4c8d4b75253be06299b0786587_amd64",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8a493115b7fc957bb2cb8f69314a1fe02e484db87abee79ed60d41e79fd82134_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:9021508b88e4bb0af0f244e7448ff1f014521a9d392b2241745b04a694db2080_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:171472cbdf0fcbaa145691078ab1905261fba7a24881e5e6ae590ac8165e8e3a_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:37dd7c8c5dcd7844aba30c339460e201eaaa646fb79ad01920ef15870fbc7d2f_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:5906942e53bca144c074630ad88c3cc158d521e777f17c95f56ff82e512e399e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hyperkube@sha256:625464dbba9d77d4cd210521acae68652a8c6aed28f478ad2f49b903e0d4a827_arm64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:464fd072dab1e1cf7e87d41c667f31592a64dc2af9b9c7b088d7c8d41055d0b6_s390x",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:48c9c1b2069a0ecc4a7f5f1bdde41be7b3d8088a5cccca1d843c82e670fa1ba8_amd64",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:742ae87db576224b11fda66817114232b510aa79edec7e6d2951dafba86015a0_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-hypershift-rhel8@sha256:d4d524b4f84ebebc9f13805b0a2ad3a5d7280e23188d656265e9f3a95ff85f23_arm64",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:7cfd5caded4ef20ed789ebc8eabe10aae320ac73736125a9c114019491e64448_s390x",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:a34102eedc3c1b80b2cdc1f7dd7a85482769e05a86c69b9ee476c3600a3c5ae3_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:b1bd20717966793032cd8daeb1abe9ada2c0f0b8aafdaf84824cce7e76f44664_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:09c56b2b05e1811607a56ef79f08d363b7d0451c9380b3031085bec6d5899450_amd64",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:5a1b1237344332a45eb6e7c780dd57c7eb3a5d6bd175960fbe74d8ffc3505993_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:ce89649c894f1d2abfcf00256701810904fcc79b5cdcb7a6d41b8d435639bdc2_s390x",
"8Base-RHOSE-4.13:openshift4/ose-insights-rhel8-operator@sha256:dd0ad4071e60e7fc52bd897051acfb0ab4188cd7cbef6da8b0a7ac6dc0274537_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:7e83e03f9316996422b71400e0f56dfffd86f0231f56208dade915a783b34878_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:cdceceb37ba9ab02983863894030da6e3e6882f4080611a8f3cec1778a7bfdf4_arm64",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ec0519bfc0d05479184bede2fad3fc059f2f5d18a700707caf7bbd7dde830d6d_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-api-operator@sha256:ff34d701d608be3db216bbb2444a289626b36306fadf5b6a0786dbe06e241119_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:1149bbb24a44601cf9a64879e592eb1559b8626a08fbbc2d855c474b0ab3350b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:123622446bd34b57e3f1ee3981faf40e9c988e21e57c3b579a56b088029831fe_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:43c963c0c011dba4c9b84d8eceab0867fd058ab53bfb6b831806fb4ef555fad4_s390x",
"8Base-RHOSE-4.13:openshift4/ose-machine-config-operator@sha256:836ac1685bf60cf607784380080ca6b777759dd2859d0ed9bc58db454a7b6638_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6e17de2ba14647ce67c92b3331eafeccb6aefe8874bcaca6e118a4403b058ea2_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:7b346b9a6e2d9c2563fd6d7de10723bb15616b37d313c39851e48837406e1084_s390x",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:9165401df8300e636b4a25c72d3e88de24c069c3ee4bed36bdd90acf0e143c40_arm64",
"8Base-RHOSE-4.13:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:961ace293bf966e03d432c5fe0f0d3e5b000fea960a755cea11fda1dd2b4a74e_amd64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:327ceb866493223f5e184fdd2e468a5474a155c7eb5b68f4ecedb786ff886057_s390x",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4b6374c37dbdd008ff6ae2309237f5fe497974ab257ccf181a4e7db89afa6056_arm64",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:4f51bb291ab9198ee7be8c7edcb93cf0ca91295a41cd5c89aead9dd1046d2c0a_ppc64le",
"8Base-RHOSE-4.13:openshift4/ose-openshift-apiserver-rhel8@sha256:527a1f3bcf1cda46a4aa9c5d05e8dbdfd759923eb3675a6141881033e017b869_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:22b9320ac9585cbf64323b0a45faddcf9ede05ed9a4e9947577bb973b4da8517_arm64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:4232e65758ca8449e6e2bf9d861e906156c5396ed606aad8732469c7740c827b_amd64",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:5d0c215fdae058d5c885ca413c1a3a1be2a0dd14aa8c8a2f81c58eccb71d97d1_s390x",
"8Base-RHOSE-4.13:openshift4/ose-pod@sha256:d5a6f0d18580ff16c72c30a8503dbc9eef042f37a1436c5f96cd98eba500b7f4_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:12c05195a2ae13dab2d32fa033233163d312b13f1a52b75525fa36311fdd36ee_amd64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1a569a7bb305680ec918b7155c155ffba2106de5237ca6c8f3f1d0453232633e_s390x",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:24469931fe23b851e812508f683922e3c118127d0bce5fbac28ca4c2305039f6_arm64",
"9Base-RHOSE-4.13:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:408f99eeea797688f019ae48d1146d2aafdc617f03333f738d965bdf0ccf9f13_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:45eb7b29c5b97cbe6324d53cea9393fc8a1f30bd761b57e3081f5e7d90324261_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ironic-rhel9@sha256:6a895c07df45ce45db480647afd64fd2d253ea0f442f1523b4893767e2a418a2_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:0aa20e9635b71a9efa141360d05e9041516faed20bd1a1ff86caf83aea724e8b_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:8ff987d26336520d84f2e55bd4af2f88a3f660b98fc3b1a5ec8bee7daaa40222_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:a2b8f25c021d0feba692fe04a0e485a3406482c1730dee41b859b2458388067f_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:d092c50790ff61bc56e104b4406a5e22cd9454d12e4f84cabf44bee0c52339ad_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes-rhel9@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:20f952c6f2a4609340785cf4bb0ba5057df39abe132a158a75aee4d4b1828046_amd64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:3e7f655cbab67b833482679058a40e243179297888d0b8ad71f57c9f53fa670e_arm64",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:564a94549dad9ff2a0347140a11ecd25dfa4939ba8b7302fcb748f926739ee69_ppc64le",
"9Base-RHOSE-4.13:openshift4/ose-ovn-kubernetes@sha256:acafceaf8b1ddeb060e5bea312f51eb8243fce95698ef67bc0179e1728aa7bf0_s390x"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:5989
Vulnerability from csaf_redhat - Published: 2023-10-23 09:16 - Updated: 2026-01-21 05:43Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for varnish is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don\u0027t have to create the same web page over and over again, giving the website a significant speed up.\n\nSecurity Fix(es):\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5989",
"url": "https://access.redhat.com/errata/RHSA-2023:5989"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5989.json"
}
],
"title": "Red Hat Security Advisory: varnish security update",
"tracking": {
"current_release_date": "2026-01-21T05:43:03+00:00",
"generator": {
"date": "2026-01-21T05:43:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:5989",
"initial_release_date": "2023-10-23T09:16:32+00:00",
"revision_history": [
{
"date": "2023-10-23T09:16:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-23T09:16:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T05:43:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"product": {
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64 (varnish:6)",
"product_id": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=aarch64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"product": {
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64 (varnish:6)",
"product_id": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-devel@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=aarch64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"product": {
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64 (varnish:6)",
"product_id": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-docs@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=aarch64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"product": {
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64 (varnish:6)",
"product_id": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=aarch64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"product": {
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64 (varnish:6)",
"product_id": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debuginfo@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=aarch64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"product": {
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64 (varnish:6)",
"product_id": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debugsource@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=aarch64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.src::varnish:6",
"product": {
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.src (varnish:6)",
"product_id": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.src::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=src\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.src::varnish:6",
"product": {
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.src (varnish:6)",
"product_id": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.src::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=src\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"product": {
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le (varnish:6)",
"product_id": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=ppc64le\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"product": {
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le (varnish:6)",
"product_id": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-devel@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=ppc64le\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"product": {
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le (varnish:6)",
"product_id": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-docs@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=ppc64le\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"product": {
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le (varnish:6)",
"product_id": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=ppc64le\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"product": {
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le (varnish:6)",
"product_id": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debuginfo@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=ppc64le\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"product": {
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le (varnish:6)",
"product_id": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debugsource@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=ppc64le\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"product": {
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x (varnish:6)",
"product_id": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=s390x\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"product": {
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x (varnish:6)",
"product_id": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-devel@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=s390x\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"product": {
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x (varnish:6)",
"product_id": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-docs@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=s390x\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"product": {
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x (varnish:6)",
"product_id": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=s390x\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"product": {
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x (varnish:6)",
"product_id": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debuginfo@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=s390x\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"product": {
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x (varnish:6)",
"product_id": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debugsource@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=s390x\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"product": {
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64 (varnish:6)",
"product_id": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=x86_64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"product": {
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64 (varnish:6)",
"product_id": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-devel@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=x86_64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"product": {
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64 (varnish:6)",
"product_id": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-docs@6.0.8-3.module%2Bel8.8.0%2B20455%2Bbdc2c048.1?arch=x86_64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"product": {
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64 (varnish:6)",
"product_id": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=x86_64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"product": {
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64 (varnish:6)",
"product_id": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debuginfo@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=x86_64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
},
{
"category": "product_version",
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"product": {
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64 (varnish:6)",
"product_id": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/varnish-modules-debugsource@0.15.0-6.module%2Bel8.5.0%2B11976%2B0b4af72d?arch=x86_64\u0026rpmmod=varnish:6:8080020231018193953:63b34585"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6"
},
"product_reference": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6"
},
"product_reference": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6"
},
"product_reference": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.src (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.src::varnish:6"
},
"product_reference": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.src::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6"
},
"product_reference": "varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6"
},
"product_reference": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6"
},
"product_reference": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6"
},
"product_reference": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6"
},
"product_reference": "varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6"
},
"product_reference": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6"
},
"product_reference": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6"
},
"product_reference": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6"
},
"product_reference": "varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.src (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.src::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.src::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6"
},
"product_reference": "varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6"
},
"product_reference": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6"
},
"product_reference": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6"
},
"product_reference": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6"
},
"product_reference": "varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6"
},
"product_reference": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6"
},
"product_reference": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6"
},
"product_reference": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64 (varnish:6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6"
},
"product_reference": "varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.src::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.src::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-23T09:16:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.src::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.src::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5989"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.src::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.src::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.src::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-devel-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-docs-0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.src::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debuginfo-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.aarch64::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.ppc64le::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.s390x::varnish:6",
"AppStream-8.8.0.Z.MAIN.EUS:varnish-modules-debugsource-0:0.15.0-6.module+el8.5.0+11976+0b4af72d.x86_64::varnish:6"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:7699
Vulnerability from csaf_redhat - Published: 2023-12-07 14:26 - Updated: 2026-01-21 10:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Pipelines Client tkn for 1.10.6 has been released.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Pipelines Client, tkn for the 1.10.6 release, provides a CLI tool to interact with the Pipelines and Triggers components provided by Red Hat OpenShift Pipelines 1.10.6.\n\nThe tkn CLI tool is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7699",
"url": "https://access.redhat.com/errata/RHSA-2023:7699"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "SRVKP-3610",
"url": "https://issues.redhat.com/browse/SRVKP-3610"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7699.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Pipelines Client tkn for 1.10.6 release and security update",
"tracking": {
"current_release_date": "2026-01-21T10:16:37+00:00",
"generator": {
"date": "2026-01-21T10:16:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:7699",
"initial_release_date": "2023-12-07T14:26:32+00:00",
"revision_history": [
{
"date": "2023-12-07T14:26:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-12-07T14:26:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T10:16:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Pipelines version 1.10 for RHEL 8",
"product": {
"name": "OpenShift Pipelines version 1.10 for RHEL 8",
"product_id": "8Base-PIPELINES-1.10",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_pipelines:1.10::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Pipelines"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.src",
"product": {
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.src",
"product_id": "openshift-pipelines-client-0:1.10.6-11031.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-pipelines-client@1.10.6-11031.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.x86_64",
"product": {
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.x86_64",
"product_id": "openshift-pipelines-client-0:1.10.6-11031.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-pipelines-client@1.10.6-11031.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"product": {
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"product_id": "openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-pipelines-client@1.10.6-11031.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"product": {
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"product_id": "openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-pipelines-client@1.10.6-11031.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"product": {
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"product_id": "openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-pipelines-client@1.10.6-11031.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.aarch64 as a component of OpenShift Pipelines version 1.10 for RHEL 8",
"product_id": "8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.aarch64"
},
"product_reference": "openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"relates_to_product_reference": "8Base-PIPELINES-1.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le as a component of OpenShift Pipelines version 1.10 for RHEL 8",
"product_id": "8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le"
},
"product_reference": "openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"relates_to_product_reference": "8Base-PIPELINES-1.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.s390x as a component of OpenShift Pipelines version 1.10 for RHEL 8",
"product_id": "8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.s390x"
},
"product_reference": "openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"relates_to_product_reference": "8Base-PIPELINES-1.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.src as a component of OpenShift Pipelines version 1.10 for RHEL 8",
"product_id": "8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.src"
},
"product_reference": "openshift-pipelines-client-0:1.10.6-11031.el8.src",
"relates_to_product_reference": "8Base-PIPELINES-1.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-pipelines-client-0:1.10.6-11031.el8.x86_64 as a component of OpenShift Pipelines version 1.10 for RHEL 8",
"product_id": "8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.x86_64"
},
"product_reference": "openshift-pipelines-client-0:1.10.6-11031.el8.x86_64",
"relates_to_product_reference": "8Base-PIPELINES-1.10"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.src",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-07T14:26:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.src",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7699"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.src",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.src",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.src",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-07T14:26:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.src",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7699"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.src",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.aarch64",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.ppc64le",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.s390x",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.src",
"8Base-PIPELINES-1.10:openshift-pipelines-client-0:1.10.6-11031.el8.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_6839
Vulnerability from csaf_redhat - Published: 2023-11-16 05:56 - Updated: 2024-12-18 04:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat build of MicroShift release 4.14.2 is now available with updates to\npackages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat build of MicroShift is Red Hat\u0027s light-weight Kubernetes\norchestration solution designed for edge device deployments and is built\nfrom the edge capabilities of Red Hat OpenShift. MicroShift is an\napplication that is deployed on top of Red Hat Enterprise Linux devices at\nthe edge, providing an efficient way to operate single-node clusters in\nthese low-resource environments.\n\nThis advisory contains the RPM packages for Red Hat build of MicroShift\n4.14.2. Read the following advisory for the container images for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2023:6837\n\nAll of the bug fixes may not be documented in this advisory. Read the\nfollowing release notes documentation for details about these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_build_of_microshift/4.14/html/release_notes/index\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive\nwork (CVE-2023-44487) (CVE-2023-39325)\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS\nattack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s)\nlisted in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6839",
"url": "https://access.redhat.com/errata/RHSA-2023:6839"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "OCPBUGS-20498",
"url": "https://issues.redhat.com/browse/OCPBUGS-20498"
},
{
"category": "external",
"summary": "OCPBUGS-22684",
"url": "https://issues.redhat.com/browse/OCPBUGS-22684"
},
{
"category": "external",
"summary": "OCPBUGS-22810",
"url": "https://issues.redhat.com/browse/OCPBUGS-22810"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6839.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.14.2 security update",
"tracking": {
"current_release_date": "2024-12-18T04:55:20+00:00",
"generator": {
"date": "2024-12-18T04:55:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:6839",
"initial_release_date": "2023-11-16T05:56:26+00:00",
"revision_history": [
{
"date": "2023-11-16T05:56:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-16T05:56:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T04:55:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.14",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14",
"product_id": "9Base-RHOSE-4.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.14::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"product": {
"name": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"product_id": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/microshift@4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"product": {
"name": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"product_id": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/microshift@4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"product": {
"name": "microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"product_id": "microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/microshift-networking@4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"product": {
"name": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"product_id": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/microshift@4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"product": {
"name": "microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"product_id": "microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/microshift-networking@4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"product": {
"name": "microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"product_id": "microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/microshift-greenboot@4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"product": {
"name": "microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"product_id": "microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/microshift-release-info@4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"product": {
"name": "microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"product_id": "microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/microshift-selinux@4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.14",
"product_id": "9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64"
},
"product_reference": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src as a component of Red Hat OpenShift Container Platform 4.14",
"product_id": "9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src"
},
"product_reference": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.14",
"product_id": "9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64"
},
"product_reference": "microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch as a component of Red Hat OpenShift Container Platform 4.14",
"product_id": "9Base-RHOSE-4.14:microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch"
},
"product_reference": "microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"relates_to_product_reference": "9Base-RHOSE-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.14",
"product_id": "9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64"
},
"product_reference": "microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.14",
"product_id": "9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64"
},
"product_reference": "microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch as a component of Red Hat OpenShift Container Platform 4.14",
"product_id": "9Base-RHOSE-4.14:microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch"
},
"product_reference": "microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"relates_to_product_reference": "9Base-RHOSE-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch as a component of Red Hat OpenShift Container Platform 4.14",
"product_id": "9Base-RHOSE-4.14:microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch"
},
"product_reference": "microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"relates_to_product_reference": "9Base-RHOSE-4.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-16T05:56:26+00:00",
"details": "MicroShift 4.14.2 - RPMs\n \nFor MicroShift 4.14, read the following documentation, which will be updated shortly for this release, for important instructions on how to install the latest RPMs and fully apply this asynchronous errata update:\n \nhttps://access.redhat.com/documentation/en-us/red_hat_build_of_microshift/4.14/html/release_notes/index",
"product_ids": [
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6839"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-16T05:56:26+00:00",
"details": "MicroShift 4.14.2 - RPMs\n \nFor MicroShift 4.14, read the following documentation, which will be updated shortly for this release, for important instructions on how to install the latest RPMs and fully apply this asynchronous errata update:\n \nhttps://access.redhat.com/documentation/en-us/red_hat_build_of_microshift/4.14/html/release_notes/index",
"product_ids": [
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6839"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.src",
"9Base-RHOSE-4.14:microshift-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-greenboot-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.aarch64",
"9Base-RHOSE-4.14:microshift-networking-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.x86_64",
"9Base-RHOSE-4.14:microshift-release-info-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch",
"9Base-RHOSE-4.14:microshift-selinux-0:4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:7610
Vulnerability from csaf_redhat - Published: 2023-12-06 18:17 - Updated: 2026-01-21 05:44Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.12.45 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.12.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.45. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2023:7608\n\nSecurity Fix(es):\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\n* python-werkzeug: high resource consumption leading to denial of service (CVE-2023-46136)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7610",
"url": "https://access.redhat.com/errata/RHSA-2023:7610"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "2246310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246310"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7610.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.12.45 packages and security update",
"tracking": {
"current_release_date": "2026-01-21T05:44:12+00:00",
"generator": {
"date": "2026-01-21T05:44:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:7610",
"initial_release_date": "2023-12-06T18:17:51+00:00",
"revision_history": [
{
"date": "2023-12-06T18:17:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-12-06T18:17:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T05:44:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.12::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.12::el8"
}
}
},
{
"category": "product_name",
"name": "Ironic content for Red Hat OpenShift Container Platform 4.12",
"product": {
"name": "Ironic content for Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-IRONIC-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_ironic:4.12::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src",
"product": {
"name": "openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src",
"product_id": "openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src",
"product": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src",
"product_id": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src",
"product": {
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src",
"product_id": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.25.5-2.rhaos4.12.git0217273.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src",
"product": {
"name": "openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src",
"product_id": "openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src",
"product": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src",
"product_id": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.82.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.82.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.82.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.82.1.el8_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src",
"product_id": "kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.82.1.rt7.241.el8_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-werkzeug-0:2.0.3-5.el9.src",
"product": {
"name": "python-werkzeug-0:2.0.3-5.el9.src",
"product_id": "python-werkzeug-0:2.0.3-5.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-werkzeug@2.0.3-5.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64",
"product_id": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"product_id": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"product_id": "openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"product": {
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"product_id": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.25.5-2.rhaos4.12.git0217273.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.25.5-2.rhaos4.12.git0217273.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.25.5-2.rhaos4.12.git0217273.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.82.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.82.1.rt7.241.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64",
"product_id": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64",
"product": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64",
"product_id": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"product": {
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"product_id": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.25.5-2.rhaos4.12.git0217273.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"product": {
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"product_id": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.25.5-2.rhaos4.12.git0217273.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"product": {
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"product_id": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.25.5-2.rhaos4.12.git0217273.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64",
"product_id": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64",
"product_id": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.82.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le",
"product_id": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le",
"product": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le",
"product_id": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"product": {
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"product_id": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.25.5-2.rhaos4.12.git0217273.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.25.5-2.rhaos4.12.git0217273.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.25.5-2.rhaos4.12.git0217273.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le",
"product_id": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.82.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x",
"product_id": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x",
"product": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x",
"product_id": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"product": {
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"product_id": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.25.5-2.rhaos4.12.git0217273.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"product_id": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.25.5-2.rhaos4.12.git0217273.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.25.5-2.rhaos4.12.git0217273.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x",
"product_id": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x",
"product": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x",
"product_id": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-internal@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.82.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.82.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.82.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.82.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.82.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-werkzeug-0:2.0.3-5.el9.noarch",
"product": {
"name": "python3-werkzeug-0:2.0.3-5.el9.noarch",
"product_id": "python3-werkzeug-0:2.0.3-5.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-werkzeug@2.0.3-5.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64"
},
"product_reference": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le"
},
"product_reference": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x"
},
"product_reference": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src"
},
"product_reference": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64"
},
"product_reference": "cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64"
},
"product_reference": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64"
},
"product_reference": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.82.1.el8_6.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.82.1.el8_6.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.82.1.el8_6.noarch as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.82.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.82.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64"
},
"product_reference": "kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src"
},
"product_reference": "openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x"
},
"product_reference": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src"
},
"product_reference": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src"
},
"product_reference": "openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64"
},
"product_reference": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le"
},
"product_reference": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x"
},
"product_reference": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src"
},
"product_reference": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-werkzeug-0:2.0.3-5.el9.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-IRONIC-4.12:python-werkzeug-0:2.0.3-5.el9.src"
},
"product_reference": "python-werkzeug-0:2.0.3-5.el9.src",
"relates_to_product_reference": "9Base-RHOSE-IRONIC-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-werkzeug-0:2.0.3-5.el9.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.12",
"product_id": "9Base-RHOSE-IRONIC-4.12:python3-werkzeug-0:2.0.3-5.el9.noarch"
},
"product_reference": "python3-werkzeug-0:2.0.3-5.el9.noarch",
"relates_to_product_reference": "9Base-RHOSE-IRONIC-4.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.82.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64",
"9Base-RHOSE-IRONIC-4.12:python-werkzeug-0:2.0.3-5.el9.src",
"9Base-RHOSE-IRONIC-4.12:python3-werkzeug-0:2.0.3-5.el9.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.82.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64",
"9Base-RHOSE-IRONIC-4.12:python-werkzeug-0:2.0.3-5.el9.src",
"9Base-RHOSE-IRONIC-4.12:python3-werkzeug-0:2.0.3-5.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-06T18:17:51+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7610"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.82.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64",
"9Base-RHOSE-IRONIC-4.12:python-werkzeug-0:2.0.3-5.el9.src",
"9Base-RHOSE-IRONIC-4.12:python3-werkzeug-0:2.0.3-5.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.82.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64",
"9Base-RHOSE-IRONIC-4.12:python-werkzeug-0:2.0.3-5.el9.src",
"9Base-RHOSE-IRONIC-4.12:python3-werkzeug-0:2.0.3-5.el9.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
},
{
"cve": "CVE-2023-46136",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2023-10-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.82.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246310"
}
],
"notes": [
{
"category": "description",
"text": "A resource consumption flaw was found in python-werkzeug. If a specially crafted file is uploaded by a remote attacker, it may cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-werkzeug: high resource consumption leading to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability found in python-werkzeug, which lets attackers carry out denial of service attacks by using carefully crafted multipart data, is considered a moderate issue because it could affect system resources and availability. When this vulnerability is exploited, it can cause the CPU to work excessively hard because the parsing mechanism keeps adding data chunks to an internal buffer without checking boundaries properly. This can result in legitimate requests being delayed or denied as worker processes get overloaded, affecting how well the web application performs and responds. While this problem doesn\u2019t directly compromise data integrity or confidentiality, exploiting it can disrupt the availability of the service, which is why it\u2019s seen as a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-IRONIC-4.12:python-werkzeug-0:2.0.3-5.el9.src",
"9Base-RHOSE-IRONIC-4.12:python3-werkzeug-0:2.0.3-5.el9.noarch"
],
"known_not_affected": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.82.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.src",
"8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.82.1.rt7.241.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.src",
"8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.s390x",
"8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"9Base-RHOSE-4.12:openshift-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.src",
"9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202311221849.p0.gd2ac7e1.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.s390x",
"9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202311161331.p0.ga52e8df.assembly.stream.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-46136"
},
{
"category": "external",
"summary": "RHBZ#2246310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-46136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46136",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46136"
},
{
"category": "external",
"summary": "https://github.com/pallets/werkzeug/commit/f3c803b3ade485a45f12b6d6617595350c0f03e2",
"url": "https://github.com/pallets/werkzeug/commit/f3c803b3ade485a45f12b6d6617595350c0f03e2"
},
{
"category": "external",
"summary": "https://github.com/pallets/werkzeug/security/advisories/GHSA-hrfv-mqp8-q5rw",
"url": "https://github.com/pallets/werkzeug/security/advisories/GHSA-hrfv-mqp8-q5rw"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-06T18:17:51+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html",
"product_ids": [
"9Base-RHOSE-IRONIC-4.12:python-werkzeug-0:2.0.3-5.el9.src",
"9Base-RHOSE-IRONIC-4.12:python3-werkzeug-0:2.0.3-5.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7610"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.src",
"8Base-RHOSE-4.12:cri-o-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debuginfo-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.aarch64",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.ppc64le",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.s390x",
"8Base-RHOSE-4.12:cri-o-debugsource-0:1.25.5-2.rhaos4.12.git0217273.el8.x86_64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.src",
"8Base-RHOSE-4.12:kernel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.82.1.el8_6.noarch",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.aarch64",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.ppc64le",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.s390x",
"8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.82.1.el8_6.x86_64",
"8Base-RHOSE-4.12:kernel-modules-