Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-25883 (GCVE-0-2022-25883)
Vulnerability from cvelistv5 – Published: 2023-06-21 05:00 – Updated: 2024-12-06 16:55- CWE-1333 - Regular Expression Denial of Service (ReDoS)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-10-25T13:07:28.542Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/npm/node-semver/pull/564"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441"
},
{
"url": "https://security.netapp.com/advisory/ntap-20241025-0004/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-25883",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-06T16:54:52.064322Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1333",
"description": "CWE-1333 Inefficient Regular Expression Complexity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-06T16:55:09.228Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "semver",
"vendor": "n/a",
"versions": [
{
"lessThan": "7.5.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Alessio Della Libera - Snyk Research Team"
}
],
"descriptions": [
{
"lang": "en",
"value": "Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1333",
"description": "Regular Expression Denial of Service (ReDoS)",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-21T05:00:03.352Z",
"orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"shortName": "snyk"
},
"references": [
{
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
},
{
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160"
},
{
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138"
},
{
"url": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104"
},
{
"url": "https://github.com/npm/node-semver/pull/564"
},
{
"url": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"assignerShortName": "snyk",
"cveId": "CVE-2022-25883",
"datePublished": "2023-06-21T05:00:03.352Z",
"dateReserved": "2022-02-24T11:58:25.192Z",
"dateUpdated": "2024-12-06T16:55:09.228Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-25883\",\"sourceIdentifier\":\"report@snyk.io\",\"published\":\"2023-06-21T05:15:09.060\",\"lastModified\":\"2025-09-23T15:05:46.017\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\\r\\r\\r\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"report@snyk.io\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"report@snyk.io\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1333\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1333\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1333\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:npmjs:semver:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"5.7.2\",\"matchCriteriaId\":\"3DBCA81E-C65B-40E4-8274-83F6B4F07217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:npmjs:semver:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndExcluding\":\"6.3.1\",\"matchCriteriaId\":\"E9EE5F81-D456-411C-8E1F-9D0D555B6FEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:npmjs:semver:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.5.3\",\"matchCriteriaId\":\"1B472AFF-891B-43BB-8215-DC2CC26C7F2C\"}]}]}],\"references\":[{\"url\":\"https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104\",\"source\":\"report@snyk.io\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://github.com/npm/node-semver/blob/main/internal/re.js%23L138\",\"source\":\"report@snyk.io\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://github.com/npm/node-semver/blob/main/internal/re.js%23L160\",\"source\":\"report@snyk.io\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441\",\"source\":\"report@snyk.io\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/npm/node-semver/pull/564\",\"source\":\"report@snyk.io\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795\",\"source\":\"report@snyk.io\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://github.com/npm/node-semver/blob/main/internal/re.js%23L138\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://github.com/npm/node-semver/blob/main/internal/re.js%23L160\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/npm/node-semver/pull/564\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20241025-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/npm/node-semver/blob/main/internal/re.js%23L160\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/npm/node-semver/blob/main/internal/re.js%23L138\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/npm/node-semver/pull/564\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20241025-0004/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-10-25T13:07:28.542Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-25883\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-06T16:54:52.064322Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1333\", \"description\": \"CWE-1333 Inefficient Regular Expression Complexity\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-06T16:55:03.100Z\"}}], \"cna\": {\"credits\": [{\"lang\": \"en\", \"value\": \"Alessio Della Libera - Snyk Research Team\"}], \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"semver\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.5.2\", \"versionType\": \"semver\"}]}], \"references\": [{\"url\": \"https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795\"}, {\"url\": \"https://github.com/npm/node-semver/blob/main/internal/re.js%23L160\"}, {\"url\": \"https://github.com/npm/node-semver/blob/main/internal/re.js%23L138\"}, {\"url\": \"https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104\"}, {\"url\": \"https://github.com/npm/node-semver/pull/564\"}, {\"url\": \"https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\\r\\r\\r\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"cweId\": \"CWE-1333\", \"description\": \"Regular Expression Denial of Service (ReDoS)\"}]}], \"providerMetadata\": {\"orgId\": \"bae035ff-b466-4ff4-94d0-fc9efd9e1730\", \"shortName\": \"snyk\", \"dateUpdated\": \"2023-06-21T05:00:03.352Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-25883\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-06T16:55:09.228Z\", \"dateReserved\": \"2022-02-24T11:58:25.192Z\", \"assignerOrgId\": \"bae035ff-b466-4ff4-94d0-fc9efd9e1730\", \"datePublished\": \"2023-06-21T05:00:03.352Z\", \"assignerShortName\": \"snyk\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
RHSA-2023:4341
Vulnerability from csaf_redhat - Published: 2023-08-02 13:49 - Updated: 2026-04-01 18:53A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A flaw was found in rubygem-activesupport. RubyGem's activesupport gem is vulnerable to a denial of service caused by a regular expression denial of service (ReDoS) flaw in Inflector.underscore. By sending a specially-crafted regex input, a remote attacker can use large amounts of CPU and memory, resulting in a denial of service.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Logging Subsystem 5.7.4 - Red Hat OpenShift\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Logging Subsystem 5.7.4 - Red Hat OpenShift\n\nSecurity Fix(es):\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* rubygem-activesupport: Regular Expression Denial of Service (CVE-2023-22796)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:4341",
"url": "https://access.redhat.com/errata/RHSA-2023:4341"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2164736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164736"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "LOG-2701",
"url": "https://issues.redhat.com/browse/LOG-2701"
},
{
"category": "external",
"summary": "LOG-3880",
"url": "https://issues.redhat.com/browse/LOG-3880"
},
{
"category": "external",
"summary": "LOG-4015",
"url": "https://issues.redhat.com/browse/LOG-4015"
},
{
"category": "external",
"summary": "LOG-4073",
"url": "https://issues.redhat.com/browse/LOG-4073"
},
{
"category": "external",
"summary": "LOG-4237",
"url": "https://issues.redhat.com/browse/LOG-4237"
},
{
"category": "external",
"summary": "LOG-4242",
"url": "https://issues.redhat.com/browse/LOG-4242"
},
{
"category": "external",
"summary": "LOG-4275",
"url": "https://issues.redhat.com/browse/LOG-4275"
},
{
"category": "external",
"summary": "LOG-4302",
"url": "https://issues.redhat.com/browse/LOG-4302"
},
{
"category": "external",
"summary": "LOG-4361",
"url": "https://issues.redhat.com/browse/LOG-4361"
},
{
"category": "external",
"summary": "LOG-4368",
"url": "https://issues.redhat.com/browse/LOG-4368"
},
{
"category": "external",
"summary": "LOG-4389",
"url": "https://issues.redhat.com/browse/LOG-4389"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4341.json"
}
],
"title": "Red Hat Security Advisory: Logging Subsystem 5.7.4 - Red Hat OpenShift bug fix and security update",
"tracking": {
"current_release_date": "2026-04-01T18:53:29+00:00",
"generator": {
"date": "2026-04-01T18:53:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:4341",
"initial_release_date": "2023-08-02T13:49:36+00:00",
"revision_history": [
{
"date": "2023-08-02T13:49:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-08-02T13:49:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:53:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHOL 5.7 for RHEL 8",
"product": {
"name": "RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.7::el8"
}
}
}
],
"category": "product_family",
"name": "logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.7.4-13"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.7.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-401"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-146"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-377"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-338"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-153"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-152"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-377"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.8.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64",
"product_id": "openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.28.1-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.7.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.7.4-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-290"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-115"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.7.4-13"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.7.4-28"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.7.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64",
"product": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64",
"product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.7.4-9"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-401"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-146"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-377"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-338"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-153"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64",
"product_id": "openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-152"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64",
"product_id": "openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-377"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.8.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64",
"product_id": "openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.28.1-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.7.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64",
"product": {
"name": "openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64",
"product_id": "openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v5.7.4-14"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.7.4-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-290"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-115"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.7.4-13"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.7.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-401"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-146"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-377"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-338"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-153"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le",
"product_id": "openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-152"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le",
"product_id": "openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-377"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.8.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le",
"product_id": "openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.28.1-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.7.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.7.4-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-290"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-115"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x",
"product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.7.4-13"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x",
"product": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x",
"product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.7.4-3"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x",
"product": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x",
"product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-401"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-146"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x",
"product": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x",
"product_id": "openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-377"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x",
"product": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x",
"product_id": "openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-338"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x",
"product_id": "openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-153"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x",
"product": {
"name": "openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x",
"product_id": "openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-152"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x",
"product": {
"name": "openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x",
"product_id": "openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-377"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x",
"product": {
"name": "openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x",
"product_id": "openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.8.3-1"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x",
"product": {
"name": "openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x",
"product_id": "openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.28.1-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x",
"product": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x",
"product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.7.4-4"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x",
"product": {
"name": "openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x",
"product_id": "openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.7.4-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x",
"product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-290"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x",
"product": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x",
"product_id": "openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-115"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64"
},
"product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64"
},
"product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64"
},
"product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x"
},
"product_reference": "openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x"
},
"product_reference": "openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64"
},
"product_reference": "openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le"
},
"product_reference": "openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64"
},
"product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64"
},
"product_reference": "openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64"
},
"product_reference": "openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64"
},
"product_reference": "openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64 as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64",
"relates_to_product_reference": "8Base-RHOL-5.7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le as a component of RHOL 5.7 for RHEL 8",
"product_id": "8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le"
},
"product_reference": "openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le",
"relates_to_product_reference": "8Base-RHOL-5.7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.7:openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le",
"8Base-RHOL-5.7:openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64"
],
"known_not_affected": [
"8Base-RHOL-5.7:openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le",
"8Base-RHOL-5.7:openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-08-02T13:49:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4341"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHOL-5.7:openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.7:openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2023-22796",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-01-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOL-5.7:openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2164736"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rubygem-activesupport. RubyGem\u0027s activesupport gem is vulnerable to a denial of service caused by a regular expression denial of service (ReDoS) flaw in Inflector.underscore. By sending a specially-crafted regex input, a remote attacker can use large amounts of CPU and memory, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-activesupport: Regular Expression Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x"
],
"known_not_affected": [
"8Base-RHOL-5.7:openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-22796"
},
{
"category": "external",
"summary": "RHBZ#2164736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-22796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22796"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-j6gc-792m-qgm2",
"url": "https://github.com/advisories/GHSA-j6gc-792m-qgm2"
}
],
"release_date": "2023-01-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-08-02T13:49:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4341"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOL-5.7:openshift-logging/cluster-logging-operator-bundle@sha256:e56a09fc05288a5a2ef9eb4ed9536b517e5a19b6317be07ac9caeed7cdabc2c3_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:49c4aebcd64396039f8e6d6cce6c55a92d6bbf6108ddf72bdc53606e26ac2b4a_s390x",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:67ef8c821c9b3bca057ea7199aef6e911cd7f7f999ddc2fdf82c8075794b0aa3_ppc64le",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:c65f10b5e11fd2310b21c4acbd56d1fed311e0dd69f7c33d6b2fa0e83bf2d64f_amd64",
"8Base-RHOL-5.7:openshift-logging/cluster-logging-rhel8-operator@sha256:e0c2fee54eac82bb2db9458c66f5989d1ece106028facc0bf7630cdb10ce22d9_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-operator-bundle@sha256:907c78f7ca1b56bb2ddc79b5b5555c39fd061190aebe72862bbd672c94b248b0_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:8ff461c5c4c305e1ae2991bc5df6dbf98a51b0ecc4bace6706f574beea7f64dd_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:bb1a983e04d731a4e580cc0eff4216951ddc8a9eb27ed14b1960f2b434f3cd2e_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:cf018227104330f7930731e0807ae6e4e877890bb3ab9e6d726a6765c9609a06_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-proxy-rhel8@sha256:d4baa438f24a85b8be45f0bd121d738af1503ebf18e2c54d655acb6cad9e50cc_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:44ba718456214efb36904719c4843c82449ccb18696925c7571324b4eb4a1c4c_amd64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:5575edf75617e0bd07aa97490cffd26f076aa0bcd82c3274538ab45d51e00225_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:bd46b16c0677fab4a383572c274edebbc69c571045ad449d3b5d421405f5672d_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch-rhel8-operator@sha256:c2571e820b058d0b2baaa952a3c841646e777d7735561b1a43e1024ce606ff9a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:4fdca7719007c06b5b749a4c89f80f6c9056150f9e60e00933c2c0ee1b7b6441_ppc64le",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:7af0fa05193b2f75a270c16355bcce6d2117183d59f5ed4d040d5a8e7d40e610_arm64",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:df161e83a11d953b4867faad7079fed1eead2e8fc727902b7ff9671f8d4b1c5d_s390x",
"8Base-RHOL-5.7:openshift-logging/elasticsearch6-rhel8@sha256:f2d5044bc2af0ec3e78732ae8785d217e80ff18332fca0629ca06c7d481a0d9a_amd64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:0f91fc53a5053e39de0fe264281a56a179a2b78718cfadec1e1b29506630ab70_s390x",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:34ce66194dfa6a7a20185095f0766ad57fc61225c080b67e558a81a81f815724_arm64",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:3df6df351b2f6da84340867d2895db147313931f8d82479b8872da64bec6666a_ppc64le",
"8Base-RHOL-5.7:openshift-logging/eventrouter-rhel8@sha256:f28aecb4013c43132d6261fd6817a65c2237dd8b5d9177999277ede0a228c79a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:1683bf2947833563d426e07b078e14984ea9c4f2a6da2931979eba3277f6aa2a_amd64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:337ee7e9da6cc5eeb19f5f2d626c264f02e4d928fc0966943da66e1feb3d9a7a_arm64",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:9a6c4ab015df408ff848234705bf0fbff5332e85279485d2b758f23156a9c572_ppc64le",
"8Base-RHOL-5.7:openshift-logging/fluentd-rhel8@sha256:b6c6af01832e14bbfa3077448ee626daae770e1366efdc0f0784498f4d30e6b1_s390x",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:403c0dd709adab3bc11330a6939e587dea1739cd5670965467f4760530f8df48_amd64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:7123433d58b6579455cc263f19c85b63ea951d89f66e2b733bac98a9b7ceac4b_ppc64le",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:84fb35d90e834c43f5159b21140c8b94c21ea9124449425596799f80c7cd8020_arm64",
"8Base-RHOL-5.7:openshift-logging/kibana6-rhel8@sha256:d2555e8057588a34b60584b95514be1d85de61e9efa5bf3886182eb913c48a5f_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:5bb8f176d903c84ed9d07d21d80a5640c15d7e34d0aff8635f62db039602c64f_amd64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:91d8fa588ddc7e633dd526aaa883e4a28a4cb9ac4a9ae69984c976f284779931_s390x",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:acb05b891cba1721d3eed20ecfa3b5d19a814b7759d718393c4df5d82f50c6ec_arm64",
"8Base-RHOL-5.7:openshift-logging/log-file-metric-exporter-rhel8@sha256:c808aad73043d9cd7392bdaf6d15dd1a078296df5696bbfa597c811025f61201_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:51f0afaea8d8596a8fd538decc0b5ece7a05be30a9fb50f4a4a8b5e5d1c2a6fb_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:832579acb9582f50578a47750fe74b6e872422239aba5277173c6a0bdef51a04_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:955a2a4cdc1f1a350c4559a7d3ea755b4345477aac73f1b3768247845af277bb_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-curator5-rhel8@sha256:a5b0a709ba5f19c2e99114b4cd91f96848f503cca54b9cbdf44d4f592d27bc21_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:0375fb8d4343d67fff498cc1d70ea60a2f3bdec1b02462916a252c1d096232f6_amd64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:2cd86e00137e4fa3ac2857c9f71766c43f514265e583f2efb34afda01f4f148c_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:d39a1cbbdc527136f4019717320fc2bf5de546e8f1155127b116c55cf066a61e_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-loki-rhel8@sha256:f9d15f9109b22d56825f56ec5c037e3f8af6119c022a43c4cfb0fa54bd297679_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:231a9410313b59e0a489a998fd85c92a8c538c461d2a2efaa6a5bf33c36a1aef_s390x",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:5add092b1f4fea3a2e872f41b537635cbc23d874fb2fd9d8991928ec1fbfa3f5_ppc64le",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:caaf5d6ce2c02b38ede741333d43b8e316a10dd18c2501bfd4cc404bd8029372_arm64",
"8Base-RHOL-5.7:openshift-logging/logging-view-plugin-rhel8@sha256:f54b96b6d08566acdc6d4babbcdc539a8709246aafac1ebdea67100a7f3bd52f_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-operator-bundle@sha256:c8c3190680b643c4825b186270d4acfa0cc6ae86f90842dc23b6bad6766f8367_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:2b0f8aff7372bb80de5dee22455041afc6514238088adeb643ee3890d6ec0a4d_s390x",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:3167db2da135849cdf568ddad218197d71c807fa8526179fff339016afe6f87e_ppc64le",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:31b811aeb70106ae65bcba0f36554d536ec5152cd61e65ac6eb452ce669bb595_amd64",
"8Base-RHOL-5.7:openshift-logging/loki-rhel8-operator@sha256:84bd7d93f70ada3fcc298e943d1f0cd96373c77f3da2f626a26b15121f5ee3c9_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:115fb8f4748722861fc80fe75e56f46d19ff2aa923ab9b03d6b16942750fff45_amd64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:21d62198b0452caf49ec5563682897d1e4c5e03e9e1404ce9d9cf72a7de34ba4_arm64",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:375048d10fb7192713ca038f43d57e0b34010f7c5707344de7c0abe9b3e59616_ppc64le",
"8Base-RHOL-5.7:openshift-logging/lokistack-gateway-rhel8@sha256:723e07a7914053df8edabda59d00662f51b41b1f6d3138773100d4a7c2dfd43c_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:5468b32eb88305a16f127ebe3ffd8b3f71f70f3fcb709a71d99f2ff793624aae_amd64",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:56ed37d86ce09040ca99dcd7323725266ac8f125645784185c7efdfdec70385e_s390x",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:7e2bd1808123b522d0542aeb738c57c005f079aebe23ea6f4065ff2d3ae731d7_ppc64le",
"8Base-RHOL-5.7:openshift-logging/opa-openshift-rhel8@sha256:9893a02da55a768baa6e70cd79dacc5cfb41a8b0624f9c5722a8f5faf842627a_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:3b9c8eee3ff2d4368517b1934097a612bd56a69ab98809cfa951400314f3acc0_s390x",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:7b729eacf413158e143ab4683a54ef7a33380ce9917fa3289df93f2288d6a6d2_amd64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:d6ad099e497eaad1d8dc0f2d160e1869df48c39c3f38ff4e9254799249bc96ab_arm64",
"8Base-RHOL-5.7:openshift-logging/vector-rhel8@sha256:dcd90c4fb7fa7dcaed3a27b1e80d7215bab65cde107d58fd8cd54957323f9ea7_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-activesupport: Regular Expression Denial of Service"
}
]
}
RHSA-2023:5486
Vulnerability from csaf_redhat - Published: 2023-10-06 03:41 - Updated: 2026-04-01 18:53A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.
A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.
A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.
A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.
A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.
A flaw was found in Netty's SniHandler while navigating TLS handshake which may permit a large heap allocation if the handler did not have a timeout configured. This issue may allow an attacker to send a client hello packet which would cause the server to buffer large amounts of data per connection, potentially causing an out of memory error, resulting in Denial of Service.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* server: eap-7: heap exhaustion via deserialization (CVE-2023-3171)\n\n* log4j: log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging (CVE-2023-26464)\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor (CVE-2023-4061)\n\n* tough-cookie: prototype pollution in cookie memstore (CVE-2023-26136)\n\n* bouncycastle: potential blind LDAP injection attack using a self-signed certificate (CVE-2023-33201)\n\n* netty: netty-handler: SniHandler 16MB allocation (CVE-2023-34462)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5486",
"url": "https://access.redhat.com/errata/RHSA-2023:5486"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
},
{
"category": "external",
"summary": "2182864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864"
},
{
"category": "external",
"summary": "2213639",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639"
},
{
"category": "external",
"summary": "2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "2228608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228608"
},
{
"category": "external",
"summary": "JBEAP-24667",
"url": "https://issues.redhat.com/browse/JBEAP-24667"
},
{
"category": "external",
"summary": "JBEAP-24799",
"url": "https://issues.redhat.com/browse/JBEAP-24799"
},
{
"category": "external",
"summary": "JBEAP-24966",
"url": "https://issues.redhat.com/browse/JBEAP-24966"
},
{
"category": "external",
"summary": "JBEAP-24985",
"url": "https://issues.redhat.com/browse/JBEAP-24985"
},
{
"category": "external",
"summary": "JBEAP-25032",
"url": "https://issues.redhat.com/browse/JBEAP-25032"
},
{
"category": "external",
"summary": "JBEAP-25033",
"url": "https://issues.redhat.com/browse/JBEAP-25033"
},
{
"category": "external",
"summary": "JBEAP-25078",
"url": "https://issues.redhat.com/browse/JBEAP-25078"
},
{
"category": "external",
"summary": "JBEAP-25122",
"url": "https://issues.redhat.com/browse/JBEAP-25122"
},
{
"category": "external",
"summary": "JBEAP-25135",
"url": "https://issues.redhat.com/browse/JBEAP-25135"
},
{
"category": "external",
"summary": "JBEAP-25186",
"url": "https://issues.redhat.com/browse/JBEAP-25186"
},
{
"category": "external",
"summary": "JBEAP-25200",
"url": "https://issues.redhat.com/browse/JBEAP-25200"
},
{
"category": "external",
"summary": "JBEAP-25225",
"url": "https://issues.redhat.com/browse/JBEAP-25225"
},
{
"category": "external",
"summary": "JBEAP-25261",
"url": "https://issues.redhat.com/browse/JBEAP-25261"
},
{
"category": "external",
"summary": "JBEAP-25285",
"url": "https://issues.redhat.com/browse/JBEAP-25285"
},
{
"category": "external",
"summary": "JBEAP-25312",
"url": "https://issues.redhat.com/browse/JBEAP-25312"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5486.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update on RHEL 9",
"tracking": {
"current_release_date": "2026-04-01T18:53:39+00:00",
"generator": {
"date": "2026-04-01T18:53:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:5486",
"initial_release_date": "2023-10-06T03:41:07+00:00",
"revision_history": [
{
"date": "2023-10-06T03:41:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-06T03:41:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:53:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.20-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"product_id": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.26-1.SP1_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-mod_cluster@1.4.5-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-31.Final_redhat_00030.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.94-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"product_id": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.13-2.SP1_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.8.10-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.19-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.15-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-modules@1.12.2-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"product": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"product_id": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis@2.16.0-15.redhat_00049.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"product_id": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle@1.76.0-4.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.94-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"product_id": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.13-8.GA_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.8-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.31-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.20-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.15.20-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.26-1.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-mod_cluster@1.4.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-31.Final_redhat_00030.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-31.Final_redhat_00030.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-31.Final_redhat_00030.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-rxtx@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-udt@4.1.94-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.13-2.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling-river@2.0.13-2.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.8.10-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.19-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.15-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.15-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.15-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.15-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.15-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.15-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.15-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.15-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.15-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-modules@1.12.2-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-cli@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-commons@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-core-client@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-dto@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-hornetq-protocol@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-hqclient-protocol@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jdbc-store@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jms-client@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jms-server@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-journal@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-ra@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-selector@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-server@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-service-extensions@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-tools@2.16.0-15.redhat_00049.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle@1.76.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-mail@1.76.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-pg@1.76.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-pkix@1.76.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-prov@1.76.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_id": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-util@1.76.0-4.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.13-8.GA_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.13-8.GA_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.13-8.GA_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.13-8.GA_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.13-8.GA_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.13-8.GA_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.31-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-core@5.3.31-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-envers@5.3.31-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.94-1.Final_redhat_00001.1.el9eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.94-1.Final_redhat_00001.1.el9eap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src"
},
"product_reference": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T03:41:07+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5486"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2023-3171",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"discovery_date": "2023-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2213639"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "eap-7: heap exhaustion via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3171"
},
{
"category": "external",
"summary": "RHBZ#2213639",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T03:41:07+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5486"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "eap-7: heap exhaustion via deserialization"
},
{
"cve": "CVE-2023-4061",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228608"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability requires a malicious user to previously have access to the system, especially access to the HAL interface via browser and logged with a management user who have access to the resolve-expression method, hence the moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-4061"
},
{
"category": "external",
"summary": "RHBZ#2228608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228608"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-4061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4061"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-4061",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4061"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T03:41:07+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5486"
},
{
"category": "workaround",
"details": "Wildfly administrators are recommended to use Vault, especially the Elytron subsystem, to store potential critical information such as DNS, IPs, and credentials.",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor"
},
{
"acknowledgments": [
{
"names": [
"Kokorin Vsevolod"
]
}
],
"cve": "CVE-2023-26136",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2023-07-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219310"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tough-cookie: prototype pollution in cookie memstore",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26136"
},
{
"category": "external",
"summary": "RHBZ#2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e",
"url": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/issues/282",
"url": "https://github.com/salesforce/tough-cookie/issues/282"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3",
"url": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3"
},
{
"category": "external",
"summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873",
"url": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873"
}
],
"release_date": "2023-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T03:41:07+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5486"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tough-cookie: prototype pollution in cookie memstore"
},
{
"cve": "CVE-2023-26464",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-03-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2182864"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "log4j1-socketappender: DoS via hashmap logging",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8 and 9 security impacts have been reduced to Low as they do not enable the vulnerable JDK by default.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26464"
},
{
"category": "external",
"summary": "RHBZ#2182864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464"
},
{
"category": "external",
"summary": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464",
"url": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464"
}
],
"release_date": "2023-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T03:41:07+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5486"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "log4j1-socketappender: DoS via hashmap logging"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-33201"
},
{
"category": "external",
"summary": "RHBZ#2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201"
},
{
"category": "external",
"summary": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T03:41:07+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5486"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate"
},
{
"cve": "CVE-2023-34462",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216888"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SniHandler while navigating TLS handshake which may permit a large heap allocation if the handler did not have a timeout configured. This issue may allow an attacker to send a client hello packet which would cause the server to buffer large amounts of data per connection, potentially causing an out of memory error, resulting in Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: SniHandler 16MB allocation leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34462"
},
{
"category": "external",
"summary": "RHBZ#2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462"
}
],
"release_date": "2023-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T03:41:07+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5486"
},
{
"category": "workaround",
"details": "Configuration of SniHandler with an idle timeout will mitigate this issue.",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: SniHandler 16MB allocation leads to OOM"
}
]
}
RHSA-2024:6044
Vulnerability from csaf_redhat - Published: 2024-08-29 16:23 - Updated: 2026-04-01 18:55A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Advanced Cluster Management for Kubernetes 2.11.2 General\nAvailability release images, which fix bugs and update container images.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Advanced Cluster Management for Kubernetes 2.11.2 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs. See the following\nRelease Notes documentation, which will be updated shortly for this\nrelease, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/\n\nSecurity fix(es):\nCVE-2022-25883 nodejs-semver: Regular expression denial of service",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6044",
"url": "https://access.redhat.com/errata/RHSA-2024:6044"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "ACM-12908",
"url": "https://issues.redhat.com/browse/ACM-12908"
},
{
"category": "external",
"summary": "ACM-13041",
"url": "https://issues.redhat.com/browse/ACM-13041"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6044.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.2 bug fixes and container updates",
"tracking": {
"current_release_date": "2026-04-01T18:55:49+00:00",
"generator": {
"date": "2026-04-01T18:55:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:6044",
"initial_release_date": "2024-08-29T16:23:10+00:00",
"revision_history": [
{
"date": "2024-08-29T16:23:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-29T16:23:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:55:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product": {
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:acm:2.11::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat ACM"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:b8cfd03917d420a22661ae336631f431d914cdb2d40988d5a1986613ff9e12fe_arm64",
"product": {
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:b8cfd03917d420a22661ae336631f431d914cdb2d40988d5a1986613ff9e12fe_arm64",
"product_id": "rhacm2/acm-cluster-permission-rhel9@sha256:b8cfd03917d420a22661ae336631f431d914cdb2d40988d5a1986613ff9e12fe_arm64",
"product_identification_helper": {
"purl": "pkg:oci/acm-cluster-permission-rhel9@sha256:b8cfd03917d420a22661ae336631f431d914cdb2d40988d5a1986613ff9e12fe?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-permission-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:a0f4ccde61fdd2a763d2c7fbb3f5ac5b2814260b386172c1540fec8ad98f55c9_arm64",
"product": {
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:a0f4ccde61fdd2a763d2c7fbb3f5ac5b2814260b386172c1540fec8ad98f55c9_arm64",
"product_id": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:a0f4ccde61fdd2a763d2c7fbb3f5ac5b2814260b386172c1540fec8ad98f55c9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/acm-governance-policy-addon-controller-rhel9@sha256:a0f4ccde61fdd2a763d2c7fbb3f5ac5b2814260b386172c1540fec8ad98f55c9?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:ab3d986a20ce852646911f5b388d3cb706257a054a065c6f8b75d9a03644aaab_arm64",
"product": {
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:ab3d986a20ce852646911f5b388d3cb706257a054a065c6f8b75d9a03644aaab_arm64",
"product_id": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:ab3d986a20ce852646911f5b388d3cb706257a054a065c6f8b75d9a03644aaab_arm64",
"product_identification_helper": {
"purl": "pkg:oci/acm-governance-policy-framework-addon-rhel9@sha256:ab3d986a20ce852646911f5b388d3cb706257a054a065c6f8b75d9a03644aaab?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-framework-addon-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-grafana-rhel9@sha256:a5389c1f2e2cffbe9c3486f3515174c8dfb0a21e5d34756d7febaf366adc91d1_arm64",
"product": {
"name": "rhacm2/acm-grafana-rhel9@sha256:a5389c1f2e2cffbe9c3486f3515174c8dfb0a21e5d34756d7febaf366adc91d1_arm64",
"product_id": "rhacm2/acm-grafana-rhel9@sha256:a5389c1f2e2cffbe9c3486f3515174c8dfb0a21e5d34756d7febaf366adc91d1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/acm-grafana-rhel9@sha256:a5389c1f2e2cffbe9c3486f3515174c8dfb0a21e5d34756d7febaf366adc91d1?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel9\u0026tag=v2.11.2-4"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-must-gather-rhel9@sha256:0bd298d6a49fc3a96be591912355d6ab966fa00d74068aef59222c6f147a3226_arm64",
"product": {
"name": "rhacm2/acm-must-gather-rhel9@sha256:0bd298d6a49fc3a96be591912355d6ab966fa00d74068aef59222c6f147a3226_arm64",
"product_id": "rhacm2/acm-must-gather-rhel9@sha256:0bd298d6a49fc3a96be591912355d6ab966fa00d74068aef59222c6f147a3226_arm64",
"product_identification_helper": {
"purl": "pkg:oci/acm-must-gather-rhel9@sha256:0bd298d6a49fc3a96be591912355d6ab966fa00d74068aef59222c6f147a3226?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5ea1c78750ee4c2e9fb17b3ea3433eafbb615616209dd6f4e7984e7f6095e2ee_arm64",
"product": {
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5ea1c78750ee4c2e9fb17b3ea3433eafbb615616209dd6f4e7984e7f6095e2ee_arm64",
"product_id": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5ea1c78750ee4c2e9fb17b3ea3433eafbb615616209dd6f4e7984e7f6095e2ee_arm64",
"product_identification_helper": {
"purl": "pkg:oci/acm-prometheus-config-reloader-rhel9@sha256:5ea1c78750ee4c2e9fb17b3ea3433eafbb615616209dd6f4e7984e7f6095e2ee?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-prometheus-rhel9@sha256:e0fc8a5f49eb7f510aa8a850cf56db7ef97d1de18e23d474eb9514bea5dada30_arm64",
"product": {
"name": "rhacm2/acm-prometheus-rhel9@sha256:e0fc8a5f49eb7f510aa8a850cf56db7ef97d1de18e23d474eb9514bea5dada30_arm64",
"product_id": "rhacm2/acm-prometheus-rhel9@sha256:e0fc8a5f49eb7f510aa8a850cf56db7ef97d1de18e23d474eb9514bea5dada30_arm64",
"product_identification_helper": {
"purl": "pkg:oci/acm-prometheus-rhel9@sha256:e0fc8a5f49eb7f510aa8a850cf56db7ef97d1de18e23d474eb9514bea5dada30?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-indexer-rhel9@sha256:bcc7fb0186b3ee839752d6df30b1e8fb33a4f9e5cec463c53998b677a7666c35_arm64",
"product": {
"name": "rhacm2/acm-search-indexer-rhel9@sha256:bcc7fb0186b3ee839752d6df30b1e8fb33a4f9e5cec463c53998b677a7666c35_arm64",
"product_id": "rhacm2/acm-search-indexer-rhel9@sha256:bcc7fb0186b3ee839752d6df30b1e8fb33a4f9e5cec463c53998b677a7666c35_arm64",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-indexer-rhel9@sha256:bcc7fb0186b3ee839752d6df30b1e8fb33a4f9e5cec463c53998b677a7666c35?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-indexer-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:037e5d2d019d97afd20a6a39961ebd0ca6c88e67ab5346be653cd46ac6f2489d_arm64",
"product": {
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:037e5d2d019d97afd20a6a39961ebd0ca6c88e67ab5346be653cd46ac6f2489d_arm64",
"product_id": "rhacm2/acm-search-v2-api-rhel9@sha256:037e5d2d019d97afd20a6a39961ebd0ca6c88e67ab5346be653cd46ac6f2489d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-v2-api-rhel9@sha256:037e5d2d019d97afd20a6a39961ebd0ca6c88e67ab5346be653cd46ac6f2489d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-api-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-v2-rhel9@sha256:832513a662fc4062b977857c548102efb1ddca6f1d77957dd2a9bdb8e21b92b2_arm64",
"product": {
"name": "rhacm2/acm-search-v2-rhel9@sha256:832513a662fc4062b977857c548102efb1ddca6f1d77957dd2a9bdb8e21b92b2_arm64",
"product_id": "rhacm2/acm-search-v2-rhel9@sha256:832513a662fc4062b977857c548102efb1ddca6f1d77957dd2a9bdb8e21b92b2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-v2-rhel9@sha256:832513a662fc4062b977857c548102efb1ddca6f1d77957dd2a9bdb8e21b92b2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:c9e0b72dbb4d189a4af8710e4eb1939c0bcbc0c64829d63999faf88ee01471c9_arm64",
"product": {
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:c9e0b72dbb4d189a4af8710e4eb1939c0bcbc0c64829d63999faf88ee01471c9_arm64",
"product_id": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:c9e0b72dbb4d189a4af8710e4eb1939c0bcbc0c64829d63999faf88ee01471c9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/acm-volsync-addon-controller-rhel9@sha256:c9e0b72dbb4d189a4af8710e4eb1939c0bcbc0c64829d63999faf88ee01471c9?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel9\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/cert-policy-controller-rhel9@sha256:51ca0179fdfa587ead4e4c368713ad043969cc9157bb0e3fcf9421bfd1459f09_arm64",
"product": {
"name": "rhacm2/cert-policy-controller-rhel9@sha256:51ca0179fdfa587ead4e4c368713ad043969cc9157bb0e3fcf9421bfd1459f09_arm64",
"product_id": "rhacm2/cert-policy-controller-rhel9@sha256:51ca0179fdfa587ead4e4c368713ad043969cc9157bb0e3fcf9421bfd1459f09_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cert-policy-controller-rhel9@sha256:51ca0179fdfa587ead4e4c368713ad043969cc9157bb0e3fcf9421bfd1459f09?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:313cde7df3fd7048455e3d14574c3379c61fb4f09f08892d376ca4fe81b4ec88_arm64",
"product": {
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:313cde7df3fd7048455e3d14574c3379c61fb4f09f08892d376ca4fe81b4ec88_arm64",
"product_id": "rhacm2/cluster-backup-rhel9-operator@sha256:313cde7df3fd7048455e3d14574c3379c61fb4f09f08892d376ca4fe81b4ec88_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-backup-rhel9-operator@sha256:313cde7df3fd7048455e3d14574c3379c61fb4f09f08892d376ca4fe81b4ec88?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel9-operator\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/config-policy-controller-rhel9@sha256:2fa53a7c9f4bb4c5b4ef237a3e33bfe56c5f7d8b9949fec6da90a0579ee5c1a5_arm64",
"product": {
"name": "rhacm2/config-policy-controller-rhel9@sha256:2fa53a7c9f4bb4c5b4ef237a3e33bfe56c5f7d8b9949fec6da90a0579ee5c1a5_arm64",
"product_id": "rhacm2/config-policy-controller-rhel9@sha256:2fa53a7c9f4bb4c5b4ef237a3e33bfe56c5f7d8b9949fec6da90a0579ee5c1a5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/config-policy-controller-rhel9@sha256:2fa53a7c9f4bb4c5b4ef237a3e33bfe56c5f7d8b9949fec6da90a0579ee5c1a5?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel9\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/console-rhel9@sha256:dd15df86f85136d26e97301861bdba147dfacea08b8cf09dc56910bf1e687ae1_arm64",
"product": {
"name": "rhacm2/console-rhel9@sha256:dd15df86f85136d26e97301861bdba147dfacea08b8cf09dc56910bf1e687ae1_arm64",
"product_id": "rhacm2/console-rhel9@sha256:dd15df86f85136d26e97301861bdba147dfacea08b8cf09dc56910bf1e687ae1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-rhel9@sha256:dd15df86f85136d26e97301861bdba147dfacea08b8cf09dc56910bf1e687ae1?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:7f982f2d6f649ecf2e97e9b6c7b86f4e8bbf7f2c8ba0bbd1656a84d2123764ac_arm64",
"product": {
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:7f982f2d6f649ecf2e97e9b6c7b86f4e8bbf7f2c8ba0bbd1656a84d2123764ac_arm64",
"product_id": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:7f982f2d6f649ecf2e97e9b6c7b86f4e8bbf7f2c8ba0bbd1656a84d2123764ac_arm64",
"product_identification_helper": {
"purl": "pkg:oci/endpoint-monitoring-rhel9-operator@sha256:7f982f2d6f649ecf2e97e9b6c7b86f4e8bbf7f2c8ba0bbd1656a84d2123764ac?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:a4ca90b6eaff84c204833b5487f8b57a8ac25745366e3d6ba2b1ba9555e0b4b9_arm64",
"product": {
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:a4ca90b6eaff84c204833b5487f8b57a8ac25745366e3d6ba2b1ba9555e0b4b9_arm64",
"product_id": "rhacm2/governance-policy-propagator-rhel9@sha256:a4ca90b6eaff84c204833b5487f8b57a8ac25745366e3d6ba2b1ba9555e0b4b9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/governance-policy-propagator-rhel9@sha256:a4ca90b6eaff84c204833b5487f8b57a8ac25745366e3d6ba2b1ba9555e0b4b9?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:9a1cd526bdf8206047baa7aa966efbdf3f68d349a193a37a7361af584c73a514_arm64",
"product": {
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:9a1cd526bdf8206047baa7aa966efbdf3f68d349a193a37a7361af584c73a514_arm64",
"product_id": "rhacm2/grafana-dashboard-loader-rhel9@sha256:9a1cd526bdf8206047baa7aa966efbdf3f68d349a193a37a7361af584c73a514_arm64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-dashboard-loader-rhel9@sha256:9a1cd526bdf8206047baa7aa966efbdf3f68d349a193a37a7361af584c73a514?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/insights-client-rhel9@sha256:7e2c1db62bb662bd592bfc4f905d4d6fbe8bcc5ec7b204ed5fc821855dd04475_arm64",
"product": {
"name": "rhacm2/insights-client-rhel9@sha256:7e2c1db62bb662bd592bfc4f905d4d6fbe8bcc5ec7b204ed5fc821855dd04475_arm64",
"product_id": "rhacm2/insights-client-rhel9@sha256:7e2c1db62bb662bd592bfc4f905d4d6fbe8bcc5ec7b204ed5fc821855dd04475_arm64",
"product_identification_helper": {
"purl": "pkg:oci/insights-client-rhel9@sha256:7e2c1db62bb662bd592bfc4f905d4d6fbe8bcc5ec7b204ed5fc821855dd04475?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/insights-metrics-rhel9@sha256:597a1c9f2313e7029813559f32b771ac9101d0dc3fa69e9bbe2074ad3749c9f8_arm64",
"product": {
"name": "rhacm2/insights-metrics-rhel9@sha256:597a1c9f2313e7029813559f32b771ac9101d0dc3fa69e9bbe2074ad3749c9f8_arm64",
"product_id": "rhacm2/insights-metrics-rhel9@sha256:597a1c9f2313e7029813559f32b771ac9101d0dc3fa69e9bbe2074ad3749c9f8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/insights-metrics-rhel9@sha256:597a1c9f2313e7029813559f32b771ac9101d0dc3fa69e9bbe2074ad3749c9f8?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:1c292aa57a0df6b2454087b2c28ac8ceb15a4f38ba6167f89c065c96288dae22_arm64",
"product": {
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:1c292aa57a0df6b2454087b2c28ac8ceb15a4f38ba6167f89c065c96288dae22_arm64",
"product_id": "rhacm2/klusterlet-addon-controller-rhel9@sha256:1c292aa57a0df6b2454087b2c28ac8ceb15a4f38ba6167f89c065c96288dae22_arm64",
"product_identification_helper": {
"purl": "pkg:oci/klusterlet-addon-controller-rhel9@sha256:1c292aa57a0df6b2454087b2c28ac8ceb15a4f38ba6167f89c065c96288dae22?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:8db6efd9bd0c001f314840a04a3af39d90edcee2c1346595ba306a238f41400e_arm64",
"product": {
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:8db6efd9bd0c001f314840a04a3af39d90edcee2c1346595ba306a238f41400e_arm64",
"product_id": "rhacm2/kube-rbac-proxy-rhel9@sha256:8db6efd9bd0c001f314840a04a3af39d90edcee2c1346595ba306a238f41400e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-rhel9@sha256:8db6efd9bd0c001f314840a04a3af39d90edcee2c1346595ba306a238f41400e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/kube-state-metrics-rhel9@sha256:17b158cd10422f13ebe511a2df7ccb19c057f60a04de029066a92fd05615c574_arm64",
"product": {
"name": "rhacm2/kube-state-metrics-rhel9@sha256:17b158cd10422f13ebe511a2df7ccb19c057f60a04de029066a92fd05615c574_arm64",
"product_id": "rhacm2/kube-state-metrics-rhel9@sha256:17b158cd10422f13ebe511a2df7ccb19c057f60a04de029066a92fd05615c574_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kube-state-metrics-rhel9@sha256:17b158cd10422f13ebe511a2df7ccb19c057f60a04de029066a92fd05615c574?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/memcached-rhel9@sha256:9b22e7673d2ec7de761191a6b2a08e93766ada717271f3c8321323777ac390d8_arm64",
"product": {
"name": "rhacm2/memcached-rhel9@sha256:9b22e7673d2ec7de761191a6b2a08e93766ada717271f3c8321323777ac390d8_arm64",
"product_id": "rhacm2/memcached-rhel9@sha256:9b22e7673d2ec7de761191a6b2a08e93766ada717271f3c8321323777ac390d8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/memcached-rhel9@sha256:9b22e7673d2ec7de761191a6b2a08e93766ada717271f3c8321323777ac390d8?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel9\u0026tag=v2.11.2-4"
}
}
},
{
"category": "product_version",
"name": "rhacm2/memcached-exporter-rhel9@sha256:c0bafe5f26253a71e5c3e0599e8074945a64166384b285dc89bf1506b933dac5_arm64",
"product": {
"name": "rhacm2/memcached-exporter-rhel9@sha256:c0bafe5f26253a71e5c3e0599e8074945a64166384b285dc89bf1506b933dac5_arm64",
"product_id": "rhacm2/memcached-exporter-rhel9@sha256:c0bafe5f26253a71e5c3e0599e8074945a64166384b285dc89bf1506b933dac5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/memcached-exporter-rhel9@sha256:c0bafe5f26253a71e5c3e0599e8074945a64166384b285dc89bf1506b933dac5?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/metrics-collector-rhel9@sha256:f54082f3d2cc8795868a748ef1facafe7e686fbdd7d9d26ce4742e7b3e88166f_arm64",
"product": {
"name": "rhacm2/metrics-collector-rhel9@sha256:f54082f3d2cc8795868a748ef1facafe7e686fbdd7d9d26ce4742e7b3e88166f_arm64",
"product_id": "rhacm2/metrics-collector-rhel9@sha256:f54082f3d2cc8795868a748ef1facafe7e686fbdd7d9d26ce4742e7b3e88166f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/metrics-collector-rhel9@sha256:f54082f3d2cc8795868a748ef1facafe7e686fbdd7d9d26ce4742e7b3e88166f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicloud-integrations-rhel9@sha256:61a0a0c74d9120cd51664e4935415d8b927f13f1367d6e42dcc58583156e3549_arm64",
"product": {
"name": "rhacm2/multicloud-integrations-rhel9@sha256:61a0a0c74d9120cd51664e4935415d8b927f13f1367d6e42dcc58583156e3549_arm64",
"product_id": "rhacm2/multicloud-integrations-rhel9@sha256:61a0a0c74d9120cd51664e4935415d8b927f13f1367d6e42dcc58583156e3549_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-integrations-rhel9@sha256:61a0a0c74d9120cd51664e4935415d8b927f13f1367d6e42dcc58583156e3549?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multiclusterhub-rhel9@sha256:361bd96dc256ecea450f06296c50a1df82ebadbdbbadbb782d46005d27834f35_arm64",
"product": {
"name": "rhacm2/multiclusterhub-rhel9@sha256:361bd96dc256ecea450f06296c50a1df82ebadbdbbadbb782d46005d27834f35_arm64",
"product_id": "rhacm2/multiclusterhub-rhel9@sha256:361bd96dc256ecea450f06296c50a1df82ebadbdbbadbb782d46005d27834f35_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multiclusterhub-rhel9@sha256:361bd96dc256ecea450f06296c50a1df82ebadbdbbadbb782d46005d27834f35?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:159af992ad940236d2e12e5a9a96b6268d3dd0fb2e3d50298590714a3cc2ca64_arm64",
"product": {
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:159af992ad940236d2e12e5a9a96b6268d3dd0fb2e3d50298590714a3cc2ca64_arm64",
"product_id": "rhacm2/multicluster-observability-rhel9-operator@sha256:159af992ad940236d2e12e5a9a96b6268d3dd0fb2e3d50298590714a3cc2ca64_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-observability-rhel9-operator@sha256:159af992ad940236d2e12e5a9a96b6268d3dd0fb2e3d50298590714a3cc2ca64?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:39a0489f4931228b4869e02b92c287aa55975c1fee03494efb65b6b7924dfbfa_arm64",
"product": {
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:39a0489f4931228b4869e02b92c287aa55975c1fee03494efb65b6b7924dfbfa_arm64",
"product_id": "rhacm2/multicluster-operators-application-rhel9@sha256:39a0489f4931228b4869e02b92c287aa55975c1fee03494efb65b6b7924dfbfa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-application-rhel9@sha256:39a0489f4931228b4869e02b92c287aa55975c1fee03494efb65b6b7924dfbfa?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:1971dadcae8f4cd6f83182ace52b4dd5fa140a4793e8068262d256366c5f49e9_arm64",
"product": {
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:1971dadcae8f4cd6f83182ace52b4dd5fa140a4793e8068262d256366c5f49e9_arm64",
"product_id": "rhacm2/multicluster-operators-channel-rhel9@sha256:1971dadcae8f4cd6f83182ace52b4dd5fa140a4793e8068262d256366c5f49e9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-channel-rhel9@sha256:1971dadcae8f4cd6f83182ace52b4dd5fa140a4793e8068262d256366c5f49e9?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:719ae5bcb99c622ce8d425c75058493c9f7831565906c86da3f07bc620423624_arm64",
"product": {
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:719ae5bcb99c622ce8d425c75058493c9f7831565906c86da3f07bc620423624_arm64",
"product_id": "rhacm2/multicluster-operators-subscription-rhel9@sha256:719ae5bcb99c622ce8d425c75058493c9f7831565906c86da3f07bc620423624_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-subscription-rhel9@sha256:719ae5bcb99c622ce8d425c75058493c9f7831565906c86da3f07bc620423624?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/node-exporter-rhel9@sha256:ec1b716e6dfaa7424c5f0237bf2bd03d782e28c8102c3a7c2f837024a281345a_arm64",
"product": {
"name": "rhacm2/node-exporter-rhel9@sha256:ec1b716e6dfaa7424c5f0237bf2bd03d782e28c8102c3a7c2f837024a281345a_arm64",
"product_id": "rhacm2/node-exporter-rhel9@sha256:ec1b716e6dfaa7424c5f0237bf2bd03d782e28c8102c3a7c2f837024a281345a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/node-exporter-rhel9@sha256:ec1b716e6dfaa7424c5f0237bf2bd03d782e28c8102c3a7c2f837024a281345a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/observatorium-rhel9@sha256:1a5eee37d4e2d6501f6f41062ac77aa1058e7702122fb8a63a92cf49a84439ff_arm64",
"product": {
"name": "rhacm2/observatorium-rhel9@sha256:1a5eee37d4e2d6501f6f41062ac77aa1058e7702122fb8a63a92cf49a84439ff_arm64",
"product_id": "rhacm2/observatorium-rhel9@sha256:1a5eee37d4e2d6501f6f41062ac77aa1058e7702122fb8a63a92cf49a84439ff_arm64",
"product_identification_helper": {
"purl": "pkg:oci/observatorium-rhel9@sha256:1a5eee37d4e2d6501f6f41062ac77aa1058e7702122fb8a63a92cf49a84439ff?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/observatorium-rhel9-operator@sha256:1504cc510f790e9f3afbfa227da171da370e96ccbc765f022af9f15d03d7d3eb_arm64",
"product": {
"name": "rhacm2/observatorium-rhel9-operator@sha256:1504cc510f790e9f3afbfa227da171da370e96ccbc765f022af9f15d03d7d3eb_arm64",
"product_id": "rhacm2/observatorium-rhel9-operator@sha256:1504cc510f790e9f3afbfa227da171da370e96ccbc765f022af9f15d03d7d3eb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/observatorium-rhel9-operator@sha256:1504cc510f790e9f3afbfa227da171da370e96ccbc765f022af9f15d03d7d3eb?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:1e17eb5ce26bb721c31fbaccd86f84864d4a65f0123200e4e0c61acc3341c5a0_arm64",
"product": {
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:1e17eb5ce26bb721c31fbaccd86f84864d4a65f0123200e4e0c61acc3341c5a0_arm64",
"product_id": "rhacm2/prometheus-alertmanager-rhel9@sha256:1e17eb5ce26bb721c31fbaccd86f84864d4a65f0123200e4e0c61acc3341c5a0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/prometheus-alertmanager-rhel9@sha256:1e17eb5ce26bb721c31fbaccd86f84864d4a65f0123200e4e0c61acc3341c5a0?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/prometheus-rhel9@sha256:883050f682c8dd39c59c5667bc9956bb8edc86925f00a967c72b652c15a6a995_arm64",
"product": {
"name": "rhacm2/prometheus-rhel9@sha256:883050f682c8dd39c59c5667bc9956bb8edc86925f00a967c72b652c15a6a995_arm64",
"product_id": "rhacm2/prometheus-rhel9@sha256:883050f682c8dd39c59c5667bc9956bb8edc86925f00a967c72b652c15a6a995_arm64",
"product_identification_helper": {
"purl": "pkg:oci/prometheus-rhel9@sha256:883050f682c8dd39c59c5667bc9956bb8edc86925f00a967c72b652c15a6a995?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:2e6e48e2a1eb9537ef1f309a79ad0b3356019b280f7bfcdcff266a95a7a476e7_arm64",
"product": {
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:2e6e48e2a1eb9537ef1f309a79ad0b3356019b280f7bfcdcff266a95a7a476e7_arm64",
"product_id": "rhacm2/rbac-query-proxy-rhel9@sha256:2e6e48e2a1eb9537ef1f309a79ad0b3356019b280f7bfcdcff266a95a7a476e7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rbac-query-proxy-rhel9@sha256:2e6e48e2a1eb9537ef1f309a79ad0b3356019b280f7bfcdcff266a95a7a476e7?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/search-collector-rhel9@sha256:7eb732b83dae8125b9bff7b17c9cc5e3aea53994e2fa2e525d1fb31f7a3ec651_arm64",
"product": {
"name": "rhacm2/search-collector-rhel9@sha256:7eb732b83dae8125b9bff7b17c9cc5e3aea53994e2fa2e525d1fb31f7a3ec651_arm64",
"product_id": "rhacm2/search-collector-rhel9@sha256:7eb732b83dae8125b9bff7b17c9cc5e3aea53994e2fa2e525d1fb31f7a3ec651_arm64",
"product_identification_helper": {
"purl": "pkg:oci/search-collector-rhel9@sha256:7eb732b83dae8125b9bff7b17c9cc5e3aea53994e2fa2e525d1fb31f7a3ec651?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-addon-rhel9@sha256:4dea9f61c2a9b2eeff7976ebdcae99905d9b4519171d09967d7bf505b8614d71_arm64",
"product": {
"name": "rhacm2/submariner-addon-rhel9@sha256:4dea9f61c2a9b2eeff7976ebdcae99905d9b4519171d09967d7bf505b8614d71_arm64",
"product_id": "rhacm2/submariner-addon-rhel9@sha256:4dea9f61c2a9b2eeff7976ebdcae99905d9b4519171d09967d7bf505b8614d71_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-addon-rhel9@sha256:4dea9f61c2a9b2eeff7976ebdcae99905d9b4519171d09967d7bf505b8614d71?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel9\u0026tag=v2.11.2-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/thanos-rhel9@sha256:09a4ff57bf934ad06aa25df65dbe0b2d49d02474d5558ebebbf4db88edbdbdc9_arm64",
"product": {
"name": "rhacm2/thanos-rhel9@sha256:09a4ff57bf934ad06aa25df65dbe0b2d49d02474d5558ebebbf4db88edbdbdc9_arm64",
"product_id": "rhacm2/thanos-rhel9@sha256:09a4ff57bf934ad06aa25df65dbe0b2d49d02474d5558ebebbf4db88edbdbdc9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/thanos-rhel9@sha256:09a4ff57bf934ad06aa25df65dbe0b2d49d02474d5558ebebbf4db88edbdbdc9?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:2334f844c32c699c9e3cba1133f654efc0f839bc29ffa95dcbd1d00b4606f487_arm64",
"product": {
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:2334f844c32c699c9e3cba1133f654efc0f839bc29ffa95dcbd1d00b4606f487_arm64",
"product_id": "rhacm2/thanos-receive-controller-rhel9@sha256:2334f844c32c699c9e3cba1133f654efc0f839bc29ffa95dcbd1d00b4606f487_arm64",
"product_identification_helper": {
"purl": "pkg:oci/thanos-receive-controller-rhel9@sha256:2334f844c32c699c9e3cba1133f654efc0f839bc29ffa95dcbd1d00b4606f487?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel9\u0026tag=v2.11.2-7"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:46963b47975ca67020b9e775645d30cfcf71a1eb1262730a5b613eb11ab0b47b_ppc64le",
"product": {
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:46963b47975ca67020b9e775645d30cfcf71a1eb1262730a5b613eb11ab0b47b_ppc64le",
"product_id": "rhacm2/acm-cluster-permission-rhel9@sha256:46963b47975ca67020b9e775645d30cfcf71a1eb1262730a5b613eb11ab0b47b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-cluster-permission-rhel9@sha256:46963b47975ca67020b9e775645d30cfcf71a1eb1262730a5b613eb11ab0b47b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-permission-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:19e0efc68f3a4070f8e1fe42a57e8ebc752fcc46d381d86009245419b0c9623e_ppc64le",
"product": {
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:19e0efc68f3a4070f8e1fe42a57e8ebc752fcc46d381d86009245419b0c9623e_ppc64le",
"product_id": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:19e0efc68f3a4070f8e1fe42a57e8ebc752fcc46d381d86009245419b0c9623e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-governance-policy-addon-controller-rhel9@sha256:19e0efc68f3a4070f8e1fe42a57e8ebc752fcc46d381d86009245419b0c9623e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:d60a8a429f162cef2ab47752fe18acd72f5eade4b93a75702db9b9cc8da7d674_ppc64le",
"product": {
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:d60a8a429f162cef2ab47752fe18acd72f5eade4b93a75702db9b9cc8da7d674_ppc64le",
"product_id": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:d60a8a429f162cef2ab47752fe18acd72f5eade4b93a75702db9b9cc8da7d674_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-governance-policy-framework-addon-rhel9@sha256:d60a8a429f162cef2ab47752fe18acd72f5eade4b93a75702db9b9cc8da7d674?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-framework-addon-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-grafana-rhel9@sha256:5f63690edba4da9bc0a8aebb05a5b13a0cd21853fa416474aa030af8608a0d6c_ppc64le",
"product": {
"name": "rhacm2/acm-grafana-rhel9@sha256:5f63690edba4da9bc0a8aebb05a5b13a0cd21853fa416474aa030af8608a0d6c_ppc64le",
"product_id": "rhacm2/acm-grafana-rhel9@sha256:5f63690edba4da9bc0a8aebb05a5b13a0cd21853fa416474aa030af8608a0d6c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-grafana-rhel9@sha256:5f63690edba4da9bc0a8aebb05a5b13a0cd21853fa416474aa030af8608a0d6c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel9\u0026tag=v2.11.2-4"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-must-gather-rhel9@sha256:4f18e4d08b07aefaed137ca815e4b87d8e7b9a9d9b36b015ef5b78e148c84834_ppc64le",
"product": {
"name": "rhacm2/acm-must-gather-rhel9@sha256:4f18e4d08b07aefaed137ca815e4b87d8e7b9a9d9b36b015ef5b78e148c84834_ppc64le",
"product_id": "rhacm2/acm-must-gather-rhel9@sha256:4f18e4d08b07aefaed137ca815e4b87d8e7b9a9d9b36b015ef5b78e148c84834_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-must-gather-rhel9@sha256:4f18e4d08b07aefaed137ca815e4b87d8e7b9a9d9b36b015ef5b78e148c84834?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-operator-bundle@sha256:57fbe046aa7bf06d38942e3ad3b3d0c6cb836b6111a5c8b6577c253cbdc45175_ppc64le",
"product": {
"name": "rhacm2/acm-operator-bundle@sha256:57fbe046aa7bf06d38942e3ad3b3d0c6cb836b6111a5c8b6577c253cbdc45175_ppc64le",
"product_id": "rhacm2/acm-operator-bundle@sha256:57fbe046aa7bf06d38942e3ad3b3d0c6cb836b6111a5c8b6577c253cbdc45175_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-operator-bundle@sha256:57fbe046aa7bf06d38942e3ad3b3d0c6cb836b6111a5c8b6577c253cbdc45175?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.11.2-18"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:6f49205e572e2de9fb80cd4581d6d29ffd5c87dad007f410c9c2035984ea065d_ppc64le",
"product": {
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:6f49205e572e2de9fb80cd4581d6d29ffd5c87dad007f410c9c2035984ea065d_ppc64le",
"product_id": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:6f49205e572e2de9fb80cd4581d6d29ffd5c87dad007f410c9c2035984ea065d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-prometheus-config-reloader-rhel9@sha256:6f49205e572e2de9fb80cd4581d6d29ffd5c87dad007f410c9c2035984ea065d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-prometheus-rhel9@sha256:579b7f728cf4878e7e7cc804e59f575433db4e22a1ee5fb38142d20f1c51f15e_ppc64le",
"product": {
"name": "rhacm2/acm-prometheus-rhel9@sha256:579b7f728cf4878e7e7cc804e59f575433db4e22a1ee5fb38142d20f1c51f15e_ppc64le",
"product_id": "rhacm2/acm-prometheus-rhel9@sha256:579b7f728cf4878e7e7cc804e59f575433db4e22a1ee5fb38142d20f1c51f15e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-prometheus-rhel9@sha256:579b7f728cf4878e7e7cc804e59f575433db4e22a1ee5fb38142d20f1c51f15e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-indexer-rhel9@sha256:26652d400f561ba913729bc99b1de27e7acdb6f2b768050cf9656f9daccf6cd9_ppc64le",
"product": {
"name": "rhacm2/acm-search-indexer-rhel9@sha256:26652d400f561ba913729bc99b1de27e7acdb6f2b768050cf9656f9daccf6cd9_ppc64le",
"product_id": "rhacm2/acm-search-indexer-rhel9@sha256:26652d400f561ba913729bc99b1de27e7acdb6f2b768050cf9656f9daccf6cd9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-indexer-rhel9@sha256:26652d400f561ba913729bc99b1de27e7acdb6f2b768050cf9656f9daccf6cd9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-search-indexer-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:eaeeca4d836f8c347aea55dd3c39f3761b492a05a8db43276b85cd60a4f2d709_ppc64le",
"product": {
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:eaeeca4d836f8c347aea55dd3c39f3761b492a05a8db43276b85cd60a4f2d709_ppc64le",
"product_id": "rhacm2/acm-search-v2-api-rhel9@sha256:eaeeca4d836f8c347aea55dd3c39f3761b492a05a8db43276b85cd60a4f2d709_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-v2-api-rhel9@sha256:eaeeca4d836f8c347aea55dd3c39f3761b492a05a8db43276b85cd60a4f2d709?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-api-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-v2-rhel9@sha256:e02cc7128940815e916578e0f9ba899b47961e659afa861de1c58bbd2d7f1381_ppc64le",
"product": {
"name": "rhacm2/acm-search-v2-rhel9@sha256:e02cc7128940815e916578e0f9ba899b47961e659afa861de1c58bbd2d7f1381_ppc64le",
"product_id": "rhacm2/acm-search-v2-rhel9@sha256:e02cc7128940815e916578e0f9ba899b47961e659afa861de1c58bbd2d7f1381_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-v2-rhel9@sha256:e02cc7128940815e916578e0f9ba899b47961e659afa861de1c58bbd2d7f1381?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:b65b749a71b5fb4e88c766125ef5300ddbb1091de66317f2e36a7b6fd1c24dcd_ppc64le",
"product": {
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:b65b749a71b5fb4e88c766125ef5300ddbb1091de66317f2e36a7b6fd1c24dcd_ppc64le",
"product_id": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:b65b749a71b5fb4e88c766125ef5300ddbb1091de66317f2e36a7b6fd1c24dcd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/acm-volsync-addon-controller-rhel9@sha256:b65b749a71b5fb4e88c766125ef5300ddbb1091de66317f2e36a7b6fd1c24dcd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel9\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/cert-policy-controller-rhel9@sha256:b4eed47f93eec2c1236fdd3fc00d3e7d5b71724acbd90f0d974ae5209226d0e5_ppc64le",
"product": {
"name": "rhacm2/cert-policy-controller-rhel9@sha256:b4eed47f93eec2c1236fdd3fc00d3e7d5b71724acbd90f0d974ae5209226d0e5_ppc64le",
"product_id": "rhacm2/cert-policy-controller-rhel9@sha256:b4eed47f93eec2c1236fdd3fc00d3e7d5b71724acbd90f0d974ae5209226d0e5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cert-policy-controller-rhel9@sha256:b4eed47f93eec2c1236fdd3fc00d3e7d5b71724acbd90f0d974ae5209226d0e5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:f86562dc7d33fbeb46aeca54e7ebab5c1419557de19e0c009212e9ffd17b8009_ppc64le",
"product": {
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:f86562dc7d33fbeb46aeca54e7ebab5c1419557de19e0c009212e9ffd17b8009_ppc64le",
"product_id": "rhacm2/cluster-backup-rhel9-operator@sha256:f86562dc7d33fbeb46aeca54e7ebab5c1419557de19e0c009212e9ffd17b8009_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-backup-rhel9-operator@sha256:f86562dc7d33fbeb46aeca54e7ebab5c1419557de19e0c009212e9ffd17b8009?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel9-operator\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/config-policy-controller-rhel9@sha256:a766c37590801c0bdfb09c6af7339f1c11f2f7305a40798697187d8bc2714546_ppc64le",
"product": {
"name": "rhacm2/config-policy-controller-rhel9@sha256:a766c37590801c0bdfb09c6af7339f1c11f2f7305a40798697187d8bc2714546_ppc64le",
"product_id": "rhacm2/config-policy-controller-rhel9@sha256:a766c37590801c0bdfb09c6af7339f1c11f2f7305a40798697187d8bc2714546_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/config-policy-controller-rhel9@sha256:a766c37590801c0bdfb09c6af7339f1c11f2f7305a40798697187d8bc2714546?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel9\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/console-rhel9@sha256:68aed58064888b890b0771358eab07348814a5f6fdeb6e8b410e49cf2c690253_ppc64le",
"product": {
"name": "rhacm2/console-rhel9@sha256:68aed58064888b890b0771358eab07348814a5f6fdeb6e8b410e49cf2c690253_ppc64le",
"product_id": "rhacm2/console-rhel9@sha256:68aed58064888b890b0771358eab07348814a5f6fdeb6e8b410e49cf2c690253_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-rhel9@sha256:68aed58064888b890b0771358eab07348814a5f6fdeb6e8b410e49cf2c690253?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:fbdc67f341dfdd5e6b0b69ab9ae11fa9852bef0e49d2776abec698894716766e_ppc64le",
"product": {
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:fbdc67f341dfdd5e6b0b69ab9ae11fa9852bef0e49d2776abec698894716766e_ppc64le",
"product_id": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:fbdc67f341dfdd5e6b0b69ab9ae11fa9852bef0e49d2776abec698894716766e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/endpoint-monitoring-rhel9-operator@sha256:fbdc67f341dfdd5e6b0b69ab9ae11fa9852bef0e49d2776abec698894716766e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:5d390cda6fee76c914d1bf38ea367eda83e06421a8dc9d5c17db128e99ced452_ppc64le",
"product": {
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:5d390cda6fee76c914d1bf38ea367eda83e06421a8dc9d5c17db128e99ced452_ppc64le",
"product_id": "rhacm2/governance-policy-propagator-rhel9@sha256:5d390cda6fee76c914d1bf38ea367eda83e06421a8dc9d5c17db128e99ced452_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/governance-policy-propagator-rhel9@sha256:5d390cda6fee76c914d1bf38ea367eda83e06421a8dc9d5c17db128e99ced452?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:5d41854e1cf846fb873df62ff19f8c6769a762e7ab10c59e31a7256fdc024141_ppc64le",
"product": {
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:5d41854e1cf846fb873df62ff19f8c6769a762e7ab10c59e31a7256fdc024141_ppc64le",
"product_id": "rhacm2/grafana-dashboard-loader-rhel9@sha256:5d41854e1cf846fb873df62ff19f8c6769a762e7ab10c59e31a7256fdc024141_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/grafana-dashboard-loader-rhel9@sha256:5d41854e1cf846fb873df62ff19f8c6769a762e7ab10c59e31a7256fdc024141?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/insights-client-rhel9@sha256:2c0368006980f837171e02f424046c43c64a18d64c952304cde5101651c1eef1_ppc64le",
"product": {
"name": "rhacm2/insights-client-rhel9@sha256:2c0368006980f837171e02f424046c43c64a18d64c952304cde5101651c1eef1_ppc64le",
"product_id": "rhacm2/insights-client-rhel9@sha256:2c0368006980f837171e02f424046c43c64a18d64c952304cde5101651c1eef1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/insights-client-rhel9@sha256:2c0368006980f837171e02f424046c43c64a18d64c952304cde5101651c1eef1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/insights-metrics-rhel9@sha256:91f5e194946f1e722ad77cf239b9186000d4620a0539694231470f9e37ee7b9c_ppc64le",
"product": {
"name": "rhacm2/insights-metrics-rhel9@sha256:91f5e194946f1e722ad77cf239b9186000d4620a0539694231470f9e37ee7b9c_ppc64le",
"product_id": "rhacm2/insights-metrics-rhel9@sha256:91f5e194946f1e722ad77cf239b9186000d4620a0539694231470f9e37ee7b9c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/insights-metrics-rhel9@sha256:91f5e194946f1e722ad77cf239b9186000d4620a0539694231470f9e37ee7b9c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:8dfd2e7838078b8cd16a79acef292f542c1b2f2ff658e8b8d8675975d4949c83_ppc64le",
"product": {
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:8dfd2e7838078b8cd16a79acef292f542c1b2f2ff658e8b8d8675975d4949c83_ppc64le",
"product_id": "rhacm2/klusterlet-addon-controller-rhel9@sha256:8dfd2e7838078b8cd16a79acef292f542c1b2f2ff658e8b8d8675975d4949c83_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/klusterlet-addon-controller-rhel9@sha256:8dfd2e7838078b8cd16a79acef292f542c1b2f2ff658e8b8d8675975d4949c83?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:7c8d19c50a8c067702866679ca5609fc7ef45781e6934ad30c9897d632f017f2_ppc64le",
"product": {
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:7c8d19c50a8c067702866679ca5609fc7ef45781e6934ad30c9897d632f017f2_ppc64le",
"product_id": "rhacm2/kube-rbac-proxy-rhel9@sha256:7c8d19c50a8c067702866679ca5609fc7ef45781e6934ad30c9897d632f017f2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-rhel9@sha256:7c8d19c50a8c067702866679ca5609fc7ef45781e6934ad30c9897d632f017f2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/kube-state-metrics-rhel9@sha256:f85072dc26d07a83c243e735e1b80df866c3cfb860e48afcb10372e4e88b0c99_ppc64le",
"product": {
"name": "rhacm2/kube-state-metrics-rhel9@sha256:f85072dc26d07a83c243e735e1b80df866c3cfb860e48afcb10372e4e88b0c99_ppc64le",
"product_id": "rhacm2/kube-state-metrics-rhel9@sha256:f85072dc26d07a83c243e735e1b80df866c3cfb860e48afcb10372e4e88b0c99_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kube-state-metrics-rhel9@sha256:f85072dc26d07a83c243e735e1b80df866c3cfb860e48afcb10372e4e88b0c99?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/memcached-rhel9@sha256:4be2f7292d3128f185ac2ff4f19f5b6e8abbb052b1d48e372bd952af52ec5602_ppc64le",
"product": {
"name": "rhacm2/memcached-rhel9@sha256:4be2f7292d3128f185ac2ff4f19f5b6e8abbb052b1d48e372bd952af52ec5602_ppc64le",
"product_id": "rhacm2/memcached-rhel9@sha256:4be2f7292d3128f185ac2ff4f19f5b6e8abbb052b1d48e372bd952af52ec5602_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/memcached-rhel9@sha256:4be2f7292d3128f185ac2ff4f19f5b6e8abbb052b1d48e372bd952af52ec5602?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel9\u0026tag=v2.11.2-4"
}
}
},
{
"category": "product_version",
"name": "rhacm2/memcached-exporter-rhel9@sha256:5726663d8466d5c781da49251d0d3e37c882ffe0495f77c399847acfa65e34e6_ppc64le",
"product": {
"name": "rhacm2/memcached-exporter-rhel9@sha256:5726663d8466d5c781da49251d0d3e37c882ffe0495f77c399847acfa65e34e6_ppc64le",
"product_id": "rhacm2/memcached-exporter-rhel9@sha256:5726663d8466d5c781da49251d0d3e37c882ffe0495f77c399847acfa65e34e6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/memcached-exporter-rhel9@sha256:5726663d8466d5c781da49251d0d3e37c882ffe0495f77c399847acfa65e34e6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/metrics-collector-rhel9@sha256:a417273cebecbd6765ef8cfee76842faac2e9009e21c49edf08beb1e437d045e_ppc64le",
"product": {
"name": "rhacm2/metrics-collector-rhel9@sha256:a417273cebecbd6765ef8cfee76842faac2e9009e21c49edf08beb1e437d045e_ppc64le",
"product_id": "rhacm2/metrics-collector-rhel9@sha256:a417273cebecbd6765ef8cfee76842faac2e9009e21c49edf08beb1e437d045e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/metrics-collector-rhel9@sha256:a417273cebecbd6765ef8cfee76842faac2e9009e21c49edf08beb1e437d045e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicloud-integrations-rhel9@sha256:ea34a34b26744875a6405d295aba7f3b3eefe95a82c9f313b086fcc37e6f7758_ppc64le",
"product": {
"name": "rhacm2/multicloud-integrations-rhel9@sha256:ea34a34b26744875a6405d295aba7f3b3eefe95a82c9f313b086fcc37e6f7758_ppc64le",
"product_id": "rhacm2/multicloud-integrations-rhel9@sha256:ea34a34b26744875a6405d295aba7f3b3eefe95a82c9f313b086fcc37e6f7758_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-integrations-rhel9@sha256:ea34a34b26744875a6405d295aba7f3b3eefe95a82c9f313b086fcc37e6f7758?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multiclusterhub-rhel9@sha256:be732aecdb7cfbb8b5e9fc7d9c0a35689f9b9893e5ff8669343df1325d67b8f3_ppc64le",
"product": {
"name": "rhacm2/multiclusterhub-rhel9@sha256:be732aecdb7cfbb8b5e9fc7d9c0a35689f9b9893e5ff8669343df1325d67b8f3_ppc64le",
"product_id": "rhacm2/multiclusterhub-rhel9@sha256:be732aecdb7cfbb8b5e9fc7d9c0a35689f9b9893e5ff8669343df1325d67b8f3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multiclusterhub-rhel9@sha256:be732aecdb7cfbb8b5e9fc7d9c0a35689f9b9893e5ff8669343df1325d67b8f3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:1ed41a512e64e2aaac90ce931838b24c0e87b2b00c22391f136927f21d1668c6_ppc64le",
"product": {
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:1ed41a512e64e2aaac90ce931838b24c0e87b2b00c22391f136927f21d1668c6_ppc64le",
"product_id": "rhacm2/multicluster-observability-rhel9-operator@sha256:1ed41a512e64e2aaac90ce931838b24c0e87b2b00c22391f136927f21d1668c6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-observability-rhel9-operator@sha256:1ed41a512e64e2aaac90ce931838b24c0e87b2b00c22391f136927f21d1668c6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:7e88fe2019f0384dfcebdd7a614313783d389ec4e177958c4239892310ec7347_ppc64le",
"product": {
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:7e88fe2019f0384dfcebdd7a614313783d389ec4e177958c4239892310ec7347_ppc64le",
"product_id": "rhacm2/multicluster-operators-application-rhel9@sha256:7e88fe2019f0384dfcebdd7a614313783d389ec4e177958c4239892310ec7347_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-application-rhel9@sha256:7e88fe2019f0384dfcebdd7a614313783d389ec4e177958c4239892310ec7347?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:c3cb4dad342e8093ecf9c6f2c2ef21ab3730da65a6faa53fa96661b30205b379_ppc64le",
"product": {
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:c3cb4dad342e8093ecf9c6f2c2ef21ab3730da65a6faa53fa96661b30205b379_ppc64le",
"product_id": "rhacm2/multicluster-operators-channel-rhel9@sha256:c3cb4dad342e8093ecf9c6f2c2ef21ab3730da65a6faa53fa96661b30205b379_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-channel-rhel9@sha256:c3cb4dad342e8093ecf9c6f2c2ef21ab3730da65a6faa53fa96661b30205b379?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:fc3851a9143f8d5ed09282f7693b19a1f3d0d4105b228a2b2ac5d76ee57a43ce_ppc64le",
"product": {
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:fc3851a9143f8d5ed09282f7693b19a1f3d0d4105b228a2b2ac5d76ee57a43ce_ppc64le",
"product_id": "rhacm2/multicluster-operators-subscription-rhel9@sha256:fc3851a9143f8d5ed09282f7693b19a1f3d0d4105b228a2b2ac5d76ee57a43ce_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-subscription-rhel9@sha256:fc3851a9143f8d5ed09282f7693b19a1f3d0d4105b228a2b2ac5d76ee57a43ce?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/node-exporter-rhel9@sha256:9801dc0236da72bf3bd06324a6519549c5c12b3679027f241056139f39e3769e_ppc64le",
"product": {
"name": "rhacm2/node-exporter-rhel9@sha256:9801dc0236da72bf3bd06324a6519549c5c12b3679027f241056139f39e3769e_ppc64le",
"product_id": "rhacm2/node-exporter-rhel9@sha256:9801dc0236da72bf3bd06324a6519549c5c12b3679027f241056139f39e3769e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/node-exporter-rhel9@sha256:9801dc0236da72bf3bd06324a6519549c5c12b3679027f241056139f39e3769e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/observatorium-rhel9@sha256:1089c7d9f66fe3c5c53c88ce13a95ba1edf10f5f30a46bea312aa9b9de8a0219_ppc64le",
"product": {
"name": "rhacm2/observatorium-rhel9@sha256:1089c7d9f66fe3c5c53c88ce13a95ba1edf10f5f30a46bea312aa9b9de8a0219_ppc64le",
"product_id": "rhacm2/observatorium-rhel9@sha256:1089c7d9f66fe3c5c53c88ce13a95ba1edf10f5f30a46bea312aa9b9de8a0219_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/observatorium-rhel9@sha256:1089c7d9f66fe3c5c53c88ce13a95ba1edf10f5f30a46bea312aa9b9de8a0219?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/observatorium-rhel9-operator@sha256:871aa0da83c95d09ccab54ba439714f882be4d3ddf5bac0dc976da8068092407_ppc64le",
"product": {
"name": "rhacm2/observatorium-rhel9-operator@sha256:871aa0da83c95d09ccab54ba439714f882be4d3ddf5bac0dc976da8068092407_ppc64le",
"product_id": "rhacm2/observatorium-rhel9-operator@sha256:871aa0da83c95d09ccab54ba439714f882be4d3ddf5bac0dc976da8068092407_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/observatorium-rhel9-operator@sha256:871aa0da83c95d09ccab54ba439714f882be4d3ddf5bac0dc976da8068092407?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:7b4c9723dffe4f80b35621e72d25a785490652e8183ea9041f10b2443f704a28_ppc64le",
"product": {
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:7b4c9723dffe4f80b35621e72d25a785490652e8183ea9041f10b2443f704a28_ppc64le",
"product_id": "rhacm2/prometheus-alertmanager-rhel9@sha256:7b4c9723dffe4f80b35621e72d25a785490652e8183ea9041f10b2443f704a28_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/prometheus-alertmanager-rhel9@sha256:7b4c9723dffe4f80b35621e72d25a785490652e8183ea9041f10b2443f704a28?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/prometheus-rhel9@sha256:9225b4eff0344b680a2551968991042af26ce1ee57f6e146db823a88fef17202_ppc64le",
"product": {
"name": "rhacm2/prometheus-rhel9@sha256:9225b4eff0344b680a2551968991042af26ce1ee57f6e146db823a88fef17202_ppc64le",
"product_id": "rhacm2/prometheus-rhel9@sha256:9225b4eff0344b680a2551968991042af26ce1ee57f6e146db823a88fef17202_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/prometheus-rhel9@sha256:9225b4eff0344b680a2551968991042af26ce1ee57f6e146db823a88fef17202?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:68301d721aa9238a26248f9d810251da1033746c492ad74a947c757fde8b0d82_ppc64le",
"product": {
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:68301d721aa9238a26248f9d810251da1033746c492ad74a947c757fde8b0d82_ppc64le",
"product_id": "rhacm2/rbac-query-proxy-rhel9@sha256:68301d721aa9238a26248f9d810251da1033746c492ad74a947c757fde8b0d82_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rbac-query-proxy-rhel9@sha256:68301d721aa9238a26248f9d810251da1033746c492ad74a947c757fde8b0d82?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/search-collector-rhel9@sha256:0d48dabe4e58bf5ed1d4d94e0de0554ee6266b9b49adf6b84988faededa3cadd_ppc64le",
"product": {
"name": "rhacm2/search-collector-rhel9@sha256:0d48dabe4e58bf5ed1d4d94e0de0554ee6266b9b49adf6b84988faededa3cadd_ppc64le",
"product_id": "rhacm2/search-collector-rhel9@sha256:0d48dabe4e58bf5ed1d4d94e0de0554ee6266b9b49adf6b84988faededa3cadd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/search-collector-rhel9@sha256:0d48dabe4e58bf5ed1d4d94e0de0554ee6266b9b49adf6b84988faededa3cadd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-addon-rhel9@sha256:c6c6741e214007c9a4f46430fe1de4d7b1bce96aecff335e8155d324e6c58d9c_ppc64le",
"product": {
"name": "rhacm2/submariner-addon-rhel9@sha256:c6c6741e214007c9a4f46430fe1de4d7b1bce96aecff335e8155d324e6c58d9c_ppc64le",
"product_id": "rhacm2/submariner-addon-rhel9@sha256:c6c6741e214007c9a4f46430fe1de4d7b1bce96aecff335e8155d324e6c58d9c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-addon-rhel9@sha256:c6c6741e214007c9a4f46430fe1de4d7b1bce96aecff335e8155d324e6c58d9c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel9\u0026tag=v2.11.2-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/thanos-rhel9@sha256:1680e4ab31b03683da5ca81ed425aa24eb73377147086d0d89614f9b49aeb452_ppc64le",
"product": {
"name": "rhacm2/thanos-rhel9@sha256:1680e4ab31b03683da5ca81ed425aa24eb73377147086d0d89614f9b49aeb452_ppc64le",
"product_id": "rhacm2/thanos-rhel9@sha256:1680e4ab31b03683da5ca81ed425aa24eb73377147086d0d89614f9b49aeb452_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/thanos-rhel9@sha256:1680e4ab31b03683da5ca81ed425aa24eb73377147086d0d89614f9b49aeb452?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:a4103d231dcaf4251faa183b9115d60654d7d0134d99601174fb564af5629139_ppc64le",
"product": {
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:a4103d231dcaf4251faa183b9115d60654d7d0134d99601174fb564af5629139_ppc64le",
"product_id": "rhacm2/thanos-receive-controller-rhel9@sha256:a4103d231dcaf4251faa183b9115d60654d7d0134d99601174fb564af5629139_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/thanos-receive-controller-rhel9@sha256:a4103d231dcaf4251faa183b9115d60654d7d0134d99601174fb564af5629139?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel9\u0026tag=v2.11.2-7"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:3366c160999585e8f4c2f752f9939fd3acf40d30d94113d2636e034aabb4df9d_amd64",
"product": {
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:3366c160999585e8f4c2f752f9939fd3acf40d30d94113d2636e034aabb4df9d_amd64",
"product_id": "rhacm2/acm-cluster-permission-rhel9@sha256:3366c160999585e8f4c2f752f9939fd3acf40d30d94113d2636e034aabb4df9d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-cluster-permission-rhel9@sha256:3366c160999585e8f4c2f752f9939fd3acf40d30d94113d2636e034aabb4df9d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-permission-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d0ab5b9c78a4e0edf6c631d5b19052b17e551dc6a5a522adf29c94ee24e2d0aa_amd64",
"product": {
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d0ab5b9c78a4e0edf6c631d5b19052b17e551dc6a5a522adf29c94ee24e2d0aa_amd64",
"product_id": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d0ab5b9c78a4e0edf6c631d5b19052b17e551dc6a5a522adf29c94ee24e2d0aa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-governance-policy-addon-controller-rhel9@sha256:d0ab5b9c78a4e0edf6c631d5b19052b17e551dc6a5a522adf29c94ee24e2d0aa?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:0cce3fe4592dea79eb43bb19810850135f077ca64d71a7ad3dbd5f147db2e790_amd64",
"product": {
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:0cce3fe4592dea79eb43bb19810850135f077ca64d71a7ad3dbd5f147db2e790_amd64",
"product_id": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:0cce3fe4592dea79eb43bb19810850135f077ca64d71a7ad3dbd5f147db2e790_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-governance-policy-framework-addon-rhel9@sha256:0cce3fe4592dea79eb43bb19810850135f077ca64d71a7ad3dbd5f147db2e790?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-framework-addon-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-grafana-rhel9@sha256:d2293b739ca6fcc5fe4663627f033d4a2b62e5f48bd9d0f3e9db7618305eecd5_amd64",
"product": {
"name": "rhacm2/acm-grafana-rhel9@sha256:d2293b739ca6fcc5fe4663627f033d4a2b62e5f48bd9d0f3e9db7618305eecd5_amd64",
"product_id": "rhacm2/acm-grafana-rhel9@sha256:d2293b739ca6fcc5fe4663627f033d4a2b62e5f48bd9d0f3e9db7618305eecd5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-grafana-rhel9@sha256:d2293b739ca6fcc5fe4663627f033d4a2b62e5f48bd9d0f3e9db7618305eecd5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel9\u0026tag=v2.11.2-4"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-must-gather-rhel9@sha256:102aade20bd47f3e5e34dbbacb4a47a2862dd285a5247bc4b661102a24ff6854_amd64",
"product": {
"name": "rhacm2/acm-must-gather-rhel9@sha256:102aade20bd47f3e5e34dbbacb4a47a2862dd285a5247bc4b661102a24ff6854_amd64",
"product_id": "rhacm2/acm-must-gather-rhel9@sha256:102aade20bd47f3e5e34dbbacb4a47a2862dd285a5247bc4b661102a24ff6854_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-must-gather-rhel9@sha256:102aade20bd47f3e5e34dbbacb4a47a2862dd285a5247bc4b661102a24ff6854?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-operator-bundle@sha256:0b7d0b1d3296963b1084887ced17ebb31d0c5e7eb612a2e2fe9c37f37f456ff0_amd64",
"product": {
"name": "rhacm2/acm-operator-bundle@sha256:0b7d0b1d3296963b1084887ced17ebb31d0c5e7eb612a2e2fe9c37f37f456ff0_amd64",
"product_id": "rhacm2/acm-operator-bundle@sha256:0b7d0b1d3296963b1084887ced17ebb31d0c5e7eb612a2e2fe9c37f37f456ff0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-operator-bundle@sha256:0b7d0b1d3296963b1084887ced17ebb31d0c5e7eb612a2e2fe9c37f37f456ff0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.11.2-18"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:ae2b8b404a744fe0ba5d5b3a2a294b06f4f420765f42e34a3207333c12360a07_amd64",
"product": {
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:ae2b8b404a744fe0ba5d5b3a2a294b06f4f420765f42e34a3207333c12360a07_amd64",
"product_id": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:ae2b8b404a744fe0ba5d5b3a2a294b06f4f420765f42e34a3207333c12360a07_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-prometheus-config-reloader-rhel9@sha256:ae2b8b404a744fe0ba5d5b3a2a294b06f4f420765f42e34a3207333c12360a07?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-prometheus-rhel9@sha256:a706778ba70694ba05bcdf705b64d7ab1887760a4f2b88f591d6b32f1108c7cf_amd64",
"product": {
"name": "rhacm2/acm-prometheus-rhel9@sha256:a706778ba70694ba05bcdf705b64d7ab1887760a4f2b88f591d6b32f1108c7cf_amd64",
"product_id": "rhacm2/acm-prometheus-rhel9@sha256:a706778ba70694ba05bcdf705b64d7ab1887760a4f2b88f591d6b32f1108c7cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-prometheus-rhel9@sha256:a706778ba70694ba05bcdf705b64d7ab1887760a4f2b88f591d6b32f1108c7cf?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-indexer-rhel9@sha256:2113e6d7913d712792ff92c5c79d13a7bd54750b0891327f97cee18c380ac45c_amd64",
"product": {
"name": "rhacm2/acm-search-indexer-rhel9@sha256:2113e6d7913d712792ff92c5c79d13a7bd54750b0891327f97cee18c380ac45c_amd64",
"product_id": "rhacm2/acm-search-indexer-rhel9@sha256:2113e6d7913d712792ff92c5c79d13a7bd54750b0891327f97cee18c380ac45c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-indexer-rhel9@sha256:2113e6d7913d712792ff92c5c79d13a7bd54750b0891327f97cee18c380ac45c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-indexer-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:7d214a186e82d4fb534c18dd026b6eb577bcf83bbe3c47550d9d2e234218138f_amd64",
"product": {
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:7d214a186e82d4fb534c18dd026b6eb577bcf83bbe3c47550d9d2e234218138f_amd64",
"product_id": "rhacm2/acm-search-v2-api-rhel9@sha256:7d214a186e82d4fb534c18dd026b6eb577bcf83bbe3c47550d9d2e234218138f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-v2-api-rhel9@sha256:7d214a186e82d4fb534c18dd026b6eb577bcf83bbe3c47550d9d2e234218138f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-api-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-v2-rhel9@sha256:4436bfd5acbf25128a0ffa97a6fe54db3917fc2e5843bac38fd415453077f527_amd64",
"product": {
"name": "rhacm2/acm-search-v2-rhel9@sha256:4436bfd5acbf25128a0ffa97a6fe54db3917fc2e5843bac38fd415453077f527_amd64",
"product_id": "rhacm2/acm-search-v2-rhel9@sha256:4436bfd5acbf25128a0ffa97a6fe54db3917fc2e5843bac38fd415453077f527_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-v2-rhel9@sha256:4436bfd5acbf25128a0ffa97a6fe54db3917fc2e5843bac38fd415453077f527?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:ffa283d1841f5993c8a7efa17ecdbac722a16125c581309cc75e32167831bb81_amd64",
"product": {
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:ffa283d1841f5993c8a7efa17ecdbac722a16125c581309cc75e32167831bb81_amd64",
"product_id": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:ffa283d1841f5993c8a7efa17ecdbac722a16125c581309cc75e32167831bb81_amd64",
"product_identification_helper": {
"purl": "pkg:oci/acm-volsync-addon-controller-rhel9@sha256:ffa283d1841f5993c8a7efa17ecdbac722a16125c581309cc75e32167831bb81?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel9\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/cert-policy-controller-rhel9@sha256:b421b0785565d4bb573fae2ade2271d8985524981e67f8fa6be3dda042b8d8fd_amd64",
"product": {
"name": "rhacm2/cert-policy-controller-rhel9@sha256:b421b0785565d4bb573fae2ade2271d8985524981e67f8fa6be3dda042b8d8fd_amd64",
"product_id": "rhacm2/cert-policy-controller-rhel9@sha256:b421b0785565d4bb573fae2ade2271d8985524981e67f8fa6be3dda042b8d8fd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cert-policy-controller-rhel9@sha256:b421b0785565d4bb573fae2ade2271d8985524981e67f8fa6be3dda042b8d8fd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:f5f85025adc32a867f671ec774a2dcd40b0fce602ead3d38c6333e870c9a494d_amd64",
"product": {
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:f5f85025adc32a867f671ec774a2dcd40b0fce602ead3d38c6333e870c9a494d_amd64",
"product_id": "rhacm2/cluster-backup-rhel9-operator@sha256:f5f85025adc32a867f671ec774a2dcd40b0fce602ead3d38c6333e870c9a494d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-backup-rhel9-operator@sha256:f5f85025adc32a867f671ec774a2dcd40b0fce602ead3d38c6333e870c9a494d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel9-operator\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/config-policy-controller-rhel9@sha256:3f6260c4873940c679a97365400e03eac234568e18e8cf82aaa6d413b42f3d9d_amd64",
"product": {
"name": "rhacm2/config-policy-controller-rhel9@sha256:3f6260c4873940c679a97365400e03eac234568e18e8cf82aaa6d413b42f3d9d_amd64",
"product_id": "rhacm2/config-policy-controller-rhel9@sha256:3f6260c4873940c679a97365400e03eac234568e18e8cf82aaa6d413b42f3d9d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/config-policy-controller-rhel9@sha256:3f6260c4873940c679a97365400e03eac234568e18e8cf82aaa6d413b42f3d9d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel9\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/console-rhel9@sha256:c58b30b96e0a63fa389cdf9c3dbc8d4518efd955d74bb39e0d19c58b67622995_amd64",
"product": {
"name": "rhacm2/console-rhel9@sha256:c58b30b96e0a63fa389cdf9c3dbc8d4518efd955d74bb39e0d19c58b67622995_amd64",
"product_id": "rhacm2/console-rhel9@sha256:c58b30b96e0a63fa389cdf9c3dbc8d4518efd955d74bb39e0d19c58b67622995_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-rhel9@sha256:c58b30b96e0a63fa389cdf9c3dbc8d4518efd955d74bb39e0d19c58b67622995?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:7d128aba7603a33a67ef0f67f560c5afd929cd78e2d3bf24a5958cbcc8b70661_amd64",
"product": {
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:7d128aba7603a33a67ef0f67f560c5afd929cd78e2d3bf24a5958cbcc8b70661_amd64",
"product_id": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:7d128aba7603a33a67ef0f67f560c5afd929cd78e2d3bf24a5958cbcc8b70661_amd64",
"product_identification_helper": {
"purl": "pkg:oci/endpoint-monitoring-rhel9-operator@sha256:7d128aba7603a33a67ef0f67f560c5afd929cd78e2d3bf24a5958cbcc8b70661?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:fbcad76f88280d74f8cc70a0a8f4eabc1b3562d814264c00c4aeace65ddd1685_amd64",
"product": {
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:fbcad76f88280d74f8cc70a0a8f4eabc1b3562d814264c00c4aeace65ddd1685_amd64",
"product_id": "rhacm2/governance-policy-propagator-rhel9@sha256:fbcad76f88280d74f8cc70a0a8f4eabc1b3562d814264c00c4aeace65ddd1685_amd64",
"product_identification_helper": {
"purl": "pkg:oci/governance-policy-propagator-rhel9@sha256:fbcad76f88280d74f8cc70a0a8f4eabc1b3562d814264c00c4aeace65ddd1685?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:7d73618e4322772f099856e6721913a74e49571c5193bbd6d70e0151deda85b5_amd64",
"product": {
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:7d73618e4322772f099856e6721913a74e49571c5193bbd6d70e0151deda85b5_amd64",
"product_id": "rhacm2/grafana-dashboard-loader-rhel9@sha256:7d73618e4322772f099856e6721913a74e49571c5193bbd6d70e0151deda85b5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-dashboard-loader-rhel9@sha256:7d73618e4322772f099856e6721913a74e49571c5193bbd6d70e0151deda85b5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/insights-client-rhel9@sha256:d5be048bb89baced719de180540409e23f0189405021fb14c738ee5497d379fe_amd64",
"product": {
"name": "rhacm2/insights-client-rhel9@sha256:d5be048bb89baced719de180540409e23f0189405021fb14c738ee5497d379fe_amd64",
"product_id": "rhacm2/insights-client-rhel9@sha256:d5be048bb89baced719de180540409e23f0189405021fb14c738ee5497d379fe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/insights-client-rhel9@sha256:d5be048bb89baced719de180540409e23f0189405021fb14c738ee5497d379fe?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/insights-metrics-rhel9@sha256:8a94a49a86e0ad8c316ca4ccfe22057c4de600a7a6348fde4cb9a074ced4b11d_amd64",
"product": {
"name": "rhacm2/insights-metrics-rhel9@sha256:8a94a49a86e0ad8c316ca4ccfe22057c4de600a7a6348fde4cb9a074ced4b11d_amd64",
"product_id": "rhacm2/insights-metrics-rhel9@sha256:8a94a49a86e0ad8c316ca4ccfe22057c4de600a7a6348fde4cb9a074ced4b11d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/insights-metrics-rhel9@sha256:8a94a49a86e0ad8c316ca4ccfe22057c4de600a7a6348fde4cb9a074ced4b11d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:1053810a6051c998474ffecb0edf869d0a9f7b5491a01b0901dc46b7e10d3471_amd64",
"product": {
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:1053810a6051c998474ffecb0edf869d0a9f7b5491a01b0901dc46b7e10d3471_amd64",
"product_id": "rhacm2/klusterlet-addon-controller-rhel9@sha256:1053810a6051c998474ffecb0edf869d0a9f7b5491a01b0901dc46b7e10d3471_amd64",
"product_identification_helper": {
"purl": "pkg:oci/klusterlet-addon-controller-rhel9@sha256:1053810a6051c998474ffecb0edf869d0a9f7b5491a01b0901dc46b7e10d3471?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:5866e1a7df1766e0eee840ee52e1ff6d72fd8f1ce9592d170b6dac87030bb1ba_amd64",
"product": {
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:5866e1a7df1766e0eee840ee52e1ff6d72fd8f1ce9592d170b6dac87030bb1ba_amd64",
"product_id": "rhacm2/kube-rbac-proxy-rhel9@sha256:5866e1a7df1766e0eee840ee52e1ff6d72fd8f1ce9592d170b6dac87030bb1ba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-rhel9@sha256:5866e1a7df1766e0eee840ee52e1ff6d72fd8f1ce9592d170b6dac87030bb1ba?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/kube-state-metrics-rhel9@sha256:b44d391b46d3a6e8822075e9370aebaa50ba9114655e1dca1ebee30dc35bf166_amd64",
"product": {
"name": "rhacm2/kube-state-metrics-rhel9@sha256:b44d391b46d3a6e8822075e9370aebaa50ba9114655e1dca1ebee30dc35bf166_amd64",
"product_id": "rhacm2/kube-state-metrics-rhel9@sha256:b44d391b46d3a6e8822075e9370aebaa50ba9114655e1dca1ebee30dc35bf166_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kube-state-metrics-rhel9@sha256:b44d391b46d3a6e8822075e9370aebaa50ba9114655e1dca1ebee30dc35bf166?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/memcached-rhel9@sha256:d1166a218d844b76009456e2e4e075e1bc464d5fd7fe2392b89b0f525fabcf44_amd64",
"product": {
"name": "rhacm2/memcached-rhel9@sha256:d1166a218d844b76009456e2e4e075e1bc464d5fd7fe2392b89b0f525fabcf44_amd64",
"product_id": "rhacm2/memcached-rhel9@sha256:d1166a218d844b76009456e2e4e075e1bc464d5fd7fe2392b89b0f525fabcf44_amd64",
"product_identification_helper": {
"purl": "pkg:oci/memcached-rhel9@sha256:d1166a218d844b76009456e2e4e075e1bc464d5fd7fe2392b89b0f525fabcf44?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel9\u0026tag=v2.11.2-4"
}
}
},
{
"category": "product_version",
"name": "rhacm2/memcached-exporter-rhel9@sha256:9f2428b59ef34fc9b37ea96934e327a012d7b77db07bf84c6879bf7816d81b03_amd64",
"product": {
"name": "rhacm2/memcached-exporter-rhel9@sha256:9f2428b59ef34fc9b37ea96934e327a012d7b77db07bf84c6879bf7816d81b03_amd64",
"product_id": "rhacm2/memcached-exporter-rhel9@sha256:9f2428b59ef34fc9b37ea96934e327a012d7b77db07bf84c6879bf7816d81b03_amd64",
"product_identification_helper": {
"purl": "pkg:oci/memcached-exporter-rhel9@sha256:9f2428b59ef34fc9b37ea96934e327a012d7b77db07bf84c6879bf7816d81b03?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/metrics-collector-rhel9@sha256:e9cfc8f62328454027058c94530de6f4138990c69ee2403729f81cf01ccfe160_amd64",
"product": {
"name": "rhacm2/metrics-collector-rhel9@sha256:e9cfc8f62328454027058c94530de6f4138990c69ee2403729f81cf01ccfe160_amd64",
"product_id": "rhacm2/metrics-collector-rhel9@sha256:e9cfc8f62328454027058c94530de6f4138990c69ee2403729f81cf01ccfe160_amd64",
"product_identification_helper": {
"purl": "pkg:oci/metrics-collector-rhel9@sha256:e9cfc8f62328454027058c94530de6f4138990c69ee2403729f81cf01ccfe160?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicloud-integrations-rhel9@sha256:2decfd9ef35f313c9523b8aa9cacbe3591ac664a6b33f67cd4675c7efb4ebfee_amd64",
"product": {
"name": "rhacm2/multicloud-integrations-rhel9@sha256:2decfd9ef35f313c9523b8aa9cacbe3591ac664a6b33f67cd4675c7efb4ebfee_amd64",
"product_id": "rhacm2/multicloud-integrations-rhel9@sha256:2decfd9ef35f313c9523b8aa9cacbe3591ac664a6b33f67cd4675c7efb4ebfee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-integrations-rhel9@sha256:2decfd9ef35f313c9523b8aa9cacbe3591ac664a6b33f67cd4675c7efb4ebfee?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multiclusterhub-rhel9@sha256:eed08f44cbe82ac113843463baa2888f9db9a19842fa7a341ff1b80ce2cb1b3f_amd64",
"product": {
"name": "rhacm2/multiclusterhub-rhel9@sha256:eed08f44cbe82ac113843463baa2888f9db9a19842fa7a341ff1b80ce2cb1b3f_amd64",
"product_id": "rhacm2/multiclusterhub-rhel9@sha256:eed08f44cbe82ac113843463baa2888f9db9a19842fa7a341ff1b80ce2cb1b3f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multiclusterhub-rhel9@sha256:eed08f44cbe82ac113843463baa2888f9db9a19842fa7a341ff1b80ce2cb1b3f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:76be608f697d601af69e1cd1eb329988f6dc11d7f791dc87ffee93c9b4e19462_amd64",
"product": {
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:76be608f697d601af69e1cd1eb329988f6dc11d7f791dc87ffee93c9b4e19462_amd64",
"product_id": "rhacm2/multicluster-observability-rhel9-operator@sha256:76be608f697d601af69e1cd1eb329988f6dc11d7f791dc87ffee93c9b4e19462_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-observability-rhel9-operator@sha256:76be608f697d601af69e1cd1eb329988f6dc11d7f791dc87ffee93c9b4e19462?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:13b47046e478c78322a7b1c1eedb139a6d20f7a12eba76744447808451365d4f_amd64",
"product": {
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:13b47046e478c78322a7b1c1eedb139a6d20f7a12eba76744447808451365d4f_amd64",
"product_id": "rhacm2/multicluster-operators-application-rhel9@sha256:13b47046e478c78322a7b1c1eedb139a6d20f7a12eba76744447808451365d4f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-application-rhel9@sha256:13b47046e478c78322a7b1c1eedb139a6d20f7a12eba76744447808451365d4f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:d918349890b6f5e6d3fbcc4aaadfc85a68dfa826413e1f17b9f44ebbffa237be_amd64",
"product": {
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:d918349890b6f5e6d3fbcc4aaadfc85a68dfa826413e1f17b9f44ebbffa237be_amd64",
"product_id": "rhacm2/multicluster-operators-channel-rhel9@sha256:d918349890b6f5e6d3fbcc4aaadfc85a68dfa826413e1f17b9f44ebbffa237be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-channel-rhel9@sha256:d918349890b6f5e6d3fbcc4aaadfc85a68dfa826413e1f17b9f44ebbffa237be?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:0752b4c34ad37099cce9f2eb7353d20c856e55d6c2d061aa6ec2bb30d233c7f8_amd64",
"product": {
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:0752b4c34ad37099cce9f2eb7353d20c856e55d6c2d061aa6ec2bb30d233c7f8_amd64",
"product_id": "rhacm2/multicluster-operators-subscription-rhel9@sha256:0752b4c34ad37099cce9f2eb7353d20c856e55d6c2d061aa6ec2bb30d233c7f8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-subscription-rhel9@sha256:0752b4c34ad37099cce9f2eb7353d20c856e55d6c2d061aa6ec2bb30d233c7f8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/node-exporter-rhel9@sha256:f41d452fa84c8175f7492d8d365c272a4edeaa12394e9ba798b62cf636e9d6dd_amd64",
"product": {
"name": "rhacm2/node-exporter-rhel9@sha256:f41d452fa84c8175f7492d8d365c272a4edeaa12394e9ba798b62cf636e9d6dd_amd64",
"product_id": "rhacm2/node-exporter-rhel9@sha256:f41d452fa84c8175f7492d8d365c272a4edeaa12394e9ba798b62cf636e9d6dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/node-exporter-rhel9@sha256:f41d452fa84c8175f7492d8d365c272a4edeaa12394e9ba798b62cf636e9d6dd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/observatorium-rhel9@sha256:c46292e8f38fd6917ff385a783788e9bc1837a89596d1834136bea8ea6d7beb1_amd64",
"product": {
"name": "rhacm2/observatorium-rhel9@sha256:c46292e8f38fd6917ff385a783788e9bc1837a89596d1834136bea8ea6d7beb1_amd64",
"product_id": "rhacm2/observatorium-rhel9@sha256:c46292e8f38fd6917ff385a783788e9bc1837a89596d1834136bea8ea6d7beb1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/observatorium-rhel9@sha256:c46292e8f38fd6917ff385a783788e9bc1837a89596d1834136bea8ea6d7beb1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/observatorium-rhel9-operator@sha256:6db823deb952c5ea5a050592d8abc65a6baefd9c93818c5d476084f49e0fd9cc_amd64",
"product": {
"name": "rhacm2/observatorium-rhel9-operator@sha256:6db823deb952c5ea5a050592d8abc65a6baefd9c93818c5d476084f49e0fd9cc_amd64",
"product_id": "rhacm2/observatorium-rhel9-operator@sha256:6db823deb952c5ea5a050592d8abc65a6baefd9c93818c5d476084f49e0fd9cc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/observatorium-rhel9-operator@sha256:6db823deb952c5ea5a050592d8abc65a6baefd9c93818c5d476084f49e0fd9cc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:13601743ecb798b4e701bb5cdcdfcdc6f9bdca72a3a16dbeace7f01ed80677fc_amd64",
"product": {
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:13601743ecb798b4e701bb5cdcdfcdc6f9bdca72a3a16dbeace7f01ed80677fc_amd64",
"product_id": "rhacm2/prometheus-alertmanager-rhel9@sha256:13601743ecb798b4e701bb5cdcdfcdc6f9bdca72a3a16dbeace7f01ed80677fc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/prometheus-alertmanager-rhel9@sha256:13601743ecb798b4e701bb5cdcdfcdc6f9bdca72a3a16dbeace7f01ed80677fc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/prometheus-rhel9@sha256:537ea377cb0b5ea51cc9aa40ee782b1fc62a77271d85f237712e30d57c1598b9_amd64",
"product": {
"name": "rhacm2/prometheus-rhel9@sha256:537ea377cb0b5ea51cc9aa40ee782b1fc62a77271d85f237712e30d57c1598b9_amd64",
"product_id": "rhacm2/prometheus-rhel9@sha256:537ea377cb0b5ea51cc9aa40ee782b1fc62a77271d85f237712e30d57c1598b9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/prometheus-rhel9@sha256:537ea377cb0b5ea51cc9aa40ee782b1fc62a77271d85f237712e30d57c1598b9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:a1f5ef8b49a5a5995d9e15029e3a66d10414b9177df428e9256ef3e32eb11e4b_amd64",
"product": {
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:a1f5ef8b49a5a5995d9e15029e3a66d10414b9177df428e9256ef3e32eb11e4b_amd64",
"product_id": "rhacm2/rbac-query-proxy-rhel9@sha256:a1f5ef8b49a5a5995d9e15029e3a66d10414b9177df428e9256ef3e32eb11e4b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rbac-query-proxy-rhel9@sha256:a1f5ef8b49a5a5995d9e15029e3a66d10414b9177df428e9256ef3e32eb11e4b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/search-collector-rhel9@sha256:c4adaaf67565d9a08f2a77335b012f9da5aac5dd97205cc0505d1c4248a97e5a_amd64",
"product": {
"name": "rhacm2/search-collector-rhel9@sha256:c4adaaf67565d9a08f2a77335b012f9da5aac5dd97205cc0505d1c4248a97e5a_amd64",
"product_id": "rhacm2/search-collector-rhel9@sha256:c4adaaf67565d9a08f2a77335b012f9da5aac5dd97205cc0505d1c4248a97e5a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/search-collector-rhel9@sha256:c4adaaf67565d9a08f2a77335b012f9da5aac5dd97205cc0505d1c4248a97e5a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-addon-rhel9@sha256:aad95955f2e99469a2cf4f307bd2d72cf7645d7f0ad914c94f39dcb6c70fdb10_amd64",
"product": {
"name": "rhacm2/submariner-addon-rhel9@sha256:aad95955f2e99469a2cf4f307bd2d72cf7645d7f0ad914c94f39dcb6c70fdb10_amd64",
"product_id": "rhacm2/submariner-addon-rhel9@sha256:aad95955f2e99469a2cf4f307bd2d72cf7645d7f0ad914c94f39dcb6c70fdb10_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-addon-rhel9@sha256:aad95955f2e99469a2cf4f307bd2d72cf7645d7f0ad914c94f39dcb6c70fdb10?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel9\u0026tag=v2.11.2-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/thanos-rhel9@sha256:34dc629403688e3e85edfad53942adbb0ccfd275537fb0a3b45633f7f4879115_amd64",
"product": {
"name": "rhacm2/thanos-rhel9@sha256:34dc629403688e3e85edfad53942adbb0ccfd275537fb0a3b45633f7f4879115_amd64",
"product_id": "rhacm2/thanos-rhel9@sha256:34dc629403688e3e85edfad53942adbb0ccfd275537fb0a3b45633f7f4879115_amd64",
"product_identification_helper": {
"purl": "pkg:oci/thanos-rhel9@sha256:34dc629403688e3e85edfad53942adbb0ccfd275537fb0a3b45633f7f4879115?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:6a01c917cec17e747de35f99b9e40ad90527f26ef6759cddde61688826fd8ee3_amd64",
"product": {
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:6a01c917cec17e747de35f99b9e40ad90527f26ef6759cddde61688826fd8ee3_amd64",
"product_id": "rhacm2/thanos-receive-controller-rhel9@sha256:6a01c917cec17e747de35f99b9e40ad90527f26ef6759cddde61688826fd8ee3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/thanos-receive-controller-rhel9@sha256:6a01c917cec17e747de35f99b9e40ad90527f26ef6759cddde61688826fd8ee3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel9\u0026tag=v2.11.2-7"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:1e1bd11fb0dc8023832e136c768f79e15e4512020684d79764cb67026a54c7fe_s390x",
"product": {
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:1e1bd11fb0dc8023832e136c768f79e15e4512020684d79764cb67026a54c7fe_s390x",
"product_id": "rhacm2/acm-cluster-permission-rhel9@sha256:1e1bd11fb0dc8023832e136c768f79e15e4512020684d79764cb67026a54c7fe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-cluster-permission-rhel9@sha256:1e1bd11fb0dc8023832e136c768f79e15e4512020684d79764cb67026a54c7fe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-permission-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:5d4e34144a88f91c88096202569cd92200e9a47fb76adb31e44ed0e48c20a9fe_s390x",
"product": {
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:5d4e34144a88f91c88096202569cd92200e9a47fb76adb31e44ed0e48c20a9fe_s390x",
"product_id": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:5d4e34144a88f91c88096202569cd92200e9a47fb76adb31e44ed0e48c20a9fe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-governance-policy-addon-controller-rhel9@sha256:5d4e34144a88f91c88096202569cd92200e9a47fb76adb31e44ed0e48c20a9fe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:75e95cb72359a7fe830a1371b9ce6b09a944e62847037759b4aed0d3cd4be7d0_s390x",
"product": {
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:75e95cb72359a7fe830a1371b9ce6b09a944e62847037759b4aed0d3cd4be7d0_s390x",
"product_id": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:75e95cb72359a7fe830a1371b9ce6b09a944e62847037759b4aed0d3cd4be7d0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-governance-policy-framework-addon-rhel9@sha256:75e95cb72359a7fe830a1371b9ce6b09a944e62847037759b4aed0d3cd4be7d0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-framework-addon-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-grafana-rhel9@sha256:fccbd02c7ff5f4b9b6db304fc92c9eb0627c18e725f2f1bc0cd7bbca3c721663_s390x",
"product": {
"name": "rhacm2/acm-grafana-rhel9@sha256:fccbd02c7ff5f4b9b6db304fc92c9eb0627c18e725f2f1bc0cd7bbca3c721663_s390x",
"product_id": "rhacm2/acm-grafana-rhel9@sha256:fccbd02c7ff5f4b9b6db304fc92c9eb0627c18e725f2f1bc0cd7bbca3c721663_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-grafana-rhel9@sha256:fccbd02c7ff5f4b9b6db304fc92c9eb0627c18e725f2f1bc0cd7bbca3c721663?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel9\u0026tag=v2.11.2-4"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-must-gather-rhel9@sha256:b55d451073609d4a5ea9bccb48983bad29eae13b975135e9e64a24083e1e7aa9_s390x",
"product": {
"name": "rhacm2/acm-must-gather-rhel9@sha256:b55d451073609d4a5ea9bccb48983bad29eae13b975135e9e64a24083e1e7aa9_s390x",
"product_id": "rhacm2/acm-must-gather-rhel9@sha256:b55d451073609d4a5ea9bccb48983bad29eae13b975135e9e64a24083e1e7aa9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-must-gather-rhel9@sha256:b55d451073609d4a5ea9bccb48983bad29eae13b975135e9e64a24083e1e7aa9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-operator-bundle@sha256:01b2ffd6957b812fdcbe1a11980a7904c512461c7e39a3b3d6db254067122a83_s390x",
"product": {
"name": "rhacm2/acm-operator-bundle@sha256:01b2ffd6957b812fdcbe1a11980a7904c512461c7e39a3b3d6db254067122a83_s390x",
"product_id": "rhacm2/acm-operator-bundle@sha256:01b2ffd6957b812fdcbe1a11980a7904c512461c7e39a3b3d6db254067122a83_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-operator-bundle@sha256:01b2ffd6957b812fdcbe1a11980a7904c512461c7e39a3b3d6db254067122a83?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.11.2-18"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:902e1286a164470fdfea20e8ed19a1e8be2aac4ff8ace09df1101a61afa71a7a_s390x",
"product": {
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:902e1286a164470fdfea20e8ed19a1e8be2aac4ff8ace09df1101a61afa71a7a_s390x",
"product_id": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:902e1286a164470fdfea20e8ed19a1e8be2aac4ff8ace09df1101a61afa71a7a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-prometheus-config-reloader-rhel9@sha256:902e1286a164470fdfea20e8ed19a1e8be2aac4ff8ace09df1101a61afa71a7a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-prometheus-rhel9@sha256:b120cb215382640a2656b9f8e4c4838cdf87dde769bee126f728cf7fd82f6dff_s390x",
"product": {
"name": "rhacm2/acm-prometheus-rhel9@sha256:b120cb215382640a2656b9f8e4c4838cdf87dde769bee126f728cf7fd82f6dff_s390x",
"product_id": "rhacm2/acm-prometheus-rhel9@sha256:b120cb215382640a2656b9f8e4c4838cdf87dde769bee126f728cf7fd82f6dff_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-prometheus-rhel9@sha256:b120cb215382640a2656b9f8e4c4838cdf87dde769bee126f728cf7fd82f6dff?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-indexer-rhel9@sha256:b7f960bffccc1a431f3094a730f773437648abdcddad489fef09f4c89eb88f8a_s390x",
"product": {
"name": "rhacm2/acm-search-indexer-rhel9@sha256:b7f960bffccc1a431f3094a730f773437648abdcddad489fef09f4c89eb88f8a_s390x",
"product_id": "rhacm2/acm-search-indexer-rhel9@sha256:b7f960bffccc1a431f3094a730f773437648abdcddad489fef09f4c89eb88f8a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-indexer-rhel9@sha256:b7f960bffccc1a431f3094a730f773437648abdcddad489fef09f4c89eb88f8a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-search-indexer-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:fd7033e1202e6a129cccac9e682c1b0ebbcdc577f0a1a62491af213b1a2754d7_s390x",
"product": {
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:fd7033e1202e6a129cccac9e682c1b0ebbcdc577f0a1a62491af213b1a2754d7_s390x",
"product_id": "rhacm2/acm-search-v2-api-rhel9@sha256:fd7033e1202e6a129cccac9e682c1b0ebbcdc577f0a1a62491af213b1a2754d7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-v2-api-rhel9@sha256:fd7033e1202e6a129cccac9e682c1b0ebbcdc577f0a1a62491af213b1a2754d7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-api-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-search-v2-rhel9@sha256:b84c3be0f657bdcf774bb52a5a84d04da9f696786bcd78c73ed21397846db46d_s390x",
"product": {
"name": "rhacm2/acm-search-v2-rhel9@sha256:b84c3be0f657bdcf774bb52a5a84d04da9f696786bcd78c73ed21397846db46d_s390x",
"product_id": "rhacm2/acm-search-v2-rhel9@sha256:b84c3be0f657bdcf774bb52a5a84d04da9f696786bcd78c73ed21397846db46d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-search-v2-rhel9@sha256:b84c3be0f657bdcf774bb52a5a84d04da9f696786bcd78c73ed21397846db46d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:d3104d2297bdc2fe3f660c3c0a8b0220dd34b9adedd7b5ff0177984eb013a41d_s390x",
"product": {
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:d3104d2297bdc2fe3f660c3c0a8b0220dd34b9adedd7b5ff0177984eb013a41d_s390x",
"product_id": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:d3104d2297bdc2fe3f660c3c0a8b0220dd34b9adedd7b5ff0177984eb013a41d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/acm-volsync-addon-controller-rhel9@sha256:d3104d2297bdc2fe3f660c3c0a8b0220dd34b9adedd7b5ff0177984eb013a41d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel9\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/cert-policy-controller-rhel9@sha256:f7fa4d19cc00a6858df774d335a9423623f1e5cff2429ca75f21876988333c0c_s390x",
"product": {
"name": "rhacm2/cert-policy-controller-rhel9@sha256:f7fa4d19cc00a6858df774d335a9423623f1e5cff2429ca75f21876988333c0c_s390x",
"product_id": "rhacm2/cert-policy-controller-rhel9@sha256:f7fa4d19cc00a6858df774d335a9423623f1e5cff2429ca75f21876988333c0c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cert-policy-controller-rhel9@sha256:f7fa4d19cc00a6858df774d335a9423623f1e5cff2429ca75f21876988333c0c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:969f519ff9b78ac6754857426b9b3fcd00a055e61bd9831e1ea5569f55ccb1ab_s390x",
"product": {
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:969f519ff9b78ac6754857426b9b3fcd00a055e61bd9831e1ea5569f55ccb1ab_s390x",
"product_id": "rhacm2/cluster-backup-rhel9-operator@sha256:969f519ff9b78ac6754857426b9b3fcd00a055e61bd9831e1ea5569f55ccb1ab_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-backup-rhel9-operator@sha256:969f519ff9b78ac6754857426b9b3fcd00a055e61bd9831e1ea5569f55ccb1ab?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel9-operator\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/config-policy-controller-rhel9@sha256:7e32333dc0744b6447f901d249a58c45e67d4328e5be45a9cb113e457ecda5db_s390x",
"product": {
"name": "rhacm2/config-policy-controller-rhel9@sha256:7e32333dc0744b6447f901d249a58c45e67d4328e5be45a9cb113e457ecda5db_s390x",
"product_id": "rhacm2/config-policy-controller-rhel9@sha256:7e32333dc0744b6447f901d249a58c45e67d4328e5be45a9cb113e457ecda5db_s390x",
"product_identification_helper": {
"purl": "pkg:oci/config-policy-controller-rhel9@sha256:7e32333dc0744b6447f901d249a58c45e67d4328e5be45a9cb113e457ecda5db?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel9\u0026tag=v2.11.2-8"
}
}
},
{
"category": "product_version",
"name": "rhacm2/console-rhel9@sha256:a7f07d46f4cda207815def9d9e1fe5bb45550ddcc026d4bfabd361265c77465b_s390x",
"product": {
"name": "rhacm2/console-rhel9@sha256:a7f07d46f4cda207815def9d9e1fe5bb45550ddcc026d4bfabd361265c77465b_s390x",
"product_id": "rhacm2/console-rhel9@sha256:a7f07d46f4cda207815def9d9e1fe5bb45550ddcc026d4bfabd361265c77465b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-rhel9@sha256:a7f07d46f4cda207815def9d9e1fe5bb45550ddcc026d4bfabd361265c77465b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:970bcea18b3222206505546f59dd33f0bb272995a001d4d2f46fa52d3c26fad1_s390x",
"product": {
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:970bcea18b3222206505546f59dd33f0bb272995a001d4d2f46fa52d3c26fad1_s390x",
"product_id": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:970bcea18b3222206505546f59dd33f0bb272995a001d4d2f46fa52d3c26fad1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/endpoint-monitoring-rhel9-operator@sha256:970bcea18b3222206505546f59dd33f0bb272995a001d4d2f46fa52d3c26fad1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:ba2294c81af7e74a2f9757873f289c2bfa50cf1b90303ee849c36f3bbaf0a629_s390x",
"product": {
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:ba2294c81af7e74a2f9757873f289c2bfa50cf1b90303ee849c36f3bbaf0a629_s390x",
"product_id": "rhacm2/governance-policy-propagator-rhel9@sha256:ba2294c81af7e74a2f9757873f289c2bfa50cf1b90303ee849c36f3bbaf0a629_s390x",
"product_identification_helper": {
"purl": "pkg:oci/governance-policy-propagator-rhel9@sha256:ba2294c81af7e74a2f9757873f289c2bfa50cf1b90303ee849c36f3bbaf0a629?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:07f3c4ff8a1066f0d96209a993a781c93c84cbaff45884a466c48cdb04f2ee0f_s390x",
"product": {
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:07f3c4ff8a1066f0d96209a993a781c93c84cbaff45884a466c48cdb04f2ee0f_s390x",
"product_id": "rhacm2/grafana-dashboard-loader-rhel9@sha256:07f3c4ff8a1066f0d96209a993a781c93c84cbaff45884a466c48cdb04f2ee0f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/grafana-dashboard-loader-rhel9@sha256:07f3c4ff8a1066f0d96209a993a781c93c84cbaff45884a466c48cdb04f2ee0f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/insights-client-rhel9@sha256:cd8046e4690fb132c8b4729a7cd903d22c342cc490c52452a511993d89eb8ce8_s390x",
"product": {
"name": "rhacm2/insights-client-rhel9@sha256:cd8046e4690fb132c8b4729a7cd903d22c342cc490c52452a511993d89eb8ce8_s390x",
"product_id": "rhacm2/insights-client-rhel9@sha256:cd8046e4690fb132c8b4729a7cd903d22c342cc490c52452a511993d89eb8ce8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/insights-client-rhel9@sha256:cd8046e4690fb132c8b4729a7cd903d22c342cc490c52452a511993d89eb8ce8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/insights-metrics-rhel9@sha256:b2b6664a341979132fb48dfaccf5928d3364f67ae208c5bcc7e371b6daf76c02_s390x",
"product": {
"name": "rhacm2/insights-metrics-rhel9@sha256:b2b6664a341979132fb48dfaccf5928d3364f67ae208c5bcc7e371b6daf76c02_s390x",
"product_id": "rhacm2/insights-metrics-rhel9@sha256:b2b6664a341979132fb48dfaccf5928d3364f67ae208c5bcc7e371b6daf76c02_s390x",
"product_identification_helper": {
"purl": "pkg:oci/insights-metrics-rhel9@sha256:b2b6664a341979132fb48dfaccf5928d3364f67ae208c5bcc7e371b6daf76c02?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:68515253395e83121bdb0f46b34d20139be3f2f2857dc9bd5969808d93b19101_s390x",
"product": {
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:68515253395e83121bdb0f46b34d20139be3f2f2857dc9bd5969808d93b19101_s390x",
"product_id": "rhacm2/klusterlet-addon-controller-rhel9@sha256:68515253395e83121bdb0f46b34d20139be3f2f2857dc9bd5969808d93b19101_s390x",
"product_identification_helper": {
"purl": "pkg:oci/klusterlet-addon-controller-rhel9@sha256:68515253395e83121bdb0f46b34d20139be3f2f2857dc9bd5969808d93b19101?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:1a774795c355aaf54aa68465df0dbc979038f71e4d758564dcfe6bbe68add37b_s390x",
"product": {
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:1a774795c355aaf54aa68465df0dbc979038f71e4d758564dcfe6bbe68add37b_s390x",
"product_id": "rhacm2/kube-rbac-proxy-rhel9@sha256:1a774795c355aaf54aa68465df0dbc979038f71e4d758564dcfe6bbe68add37b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-rhel9@sha256:1a774795c355aaf54aa68465df0dbc979038f71e4d758564dcfe6bbe68add37b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/kube-state-metrics-rhel9@sha256:ff4787b74e906427ccc3e9d1485a55c6f3a0138a4f9fcc8dea3fea8abc25572f_s390x",
"product": {
"name": "rhacm2/kube-state-metrics-rhel9@sha256:ff4787b74e906427ccc3e9d1485a55c6f3a0138a4f9fcc8dea3fea8abc25572f_s390x",
"product_id": "rhacm2/kube-state-metrics-rhel9@sha256:ff4787b74e906427ccc3e9d1485a55c6f3a0138a4f9fcc8dea3fea8abc25572f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kube-state-metrics-rhel9@sha256:ff4787b74e906427ccc3e9d1485a55c6f3a0138a4f9fcc8dea3fea8abc25572f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/memcached-rhel9@sha256:d04a67c1b1605586ae6f3a25ea41b08ee8736960c22607b15b75d02a98f2b75a_s390x",
"product": {
"name": "rhacm2/memcached-rhel9@sha256:d04a67c1b1605586ae6f3a25ea41b08ee8736960c22607b15b75d02a98f2b75a_s390x",
"product_id": "rhacm2/memcached-rhel9@sha256:d04a67c1b1605586ae6f3a25ea41b08ee8736960c22607b15b75d02a98f2b75a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/memcached-rhel9@sha256:d04a67c1b1605586ae6f3a25ea41b08ee8736960c22607b15b75d02a98f2b75a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel9\u0026tag=v2.11.2-4"
}
}
},
{
"category": "product_version",
"name": "rhacm2/memcached-exporter-rhel9@sha256:4e799bc36694566e319c04b42dec3b9e707eec363aab6aa2e522f8c463d22545_s390x",
"product": {
"name": "rhacm2/memcached-exporter-rhel9@sha256:4e799bc36694566e319c04b42dec3b9e707eec363aab6aa2e522f8c463d22545_s390x",
"product_id": "rhacm2/memcached-exporter-rhel9@sha256:4e799bc36694566e319c04b42dec3b9e707eec363aab6aa2e522f8c463d22545_s390x",
"product_identification_helper": {
"purl": "pkg:oci/memcached-exporter-rhel9@sha256:4e799bc36694566e319c04b42dec3b9e707eec363aab6aa2e522f8c463d22545?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/metrics-collector-rhel9@sha256:cfb1610e0b3c2d09647d6257e94a8eee13520f6a5cdf015f9274be810193f757_s390x",
"product": {
"name": "rhacm2/metrics-collector-rhel9@sha256:cfb1610e0b3c2d09647d6257e94a8eee13520f6a5cdf015f9274be810193f757_s390x",
"product_id": "rhacm2/metrics-collector-rhel9@sha256:cfb1610e0b3c2d09647d6257e94a8eee13520f6a5cdf015f9274be810193f757_s390x",
"product_identification_helper": {
"purl": "pkg:oci/metrics-collector-rhel9@sha256:cfb1610e0b3c2d09647d6257e94a8eee13520f6a5cdf015f9274be810193f757?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicloud-integrations-rhel9@sha256:aa99db54c55d6e4de3b6b38edb07f663c20330879bddd7e01fe07c09cc089692_s390x",
"product": {
"name": "rhacm2/multicloud-integrations-rhel9@sha256:aa99db54c55d6e4de3b6b38edb07f663c20330879bddd7e01fe07c09cc089692_s390x",
"product_id": "rhacm2/multicloud-integrations-rhel9@sha256:aa99db54c55d6e4de3b6b38edb07f663c20330879bddd7e01fe07c09cc089692_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-integrations-rhel9@sha256:aa99db54c55d6e4de3b6b38edb07f663c20330879bddd7e01fe07c09cc089692?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multiclusterhub-rhel9@sha256:0460beb9aafd8252c3ae014ce22a3274aab5dadf30c567a0fa4cecc0ee82f3f0_s390x",
"product": {
"name": "rhacm2/multiclusterhub-rhel9@sha256:0460beb9aafd8252c3ae014ce22a3274aab5dadf30c567a0fa4cecc0ee82f3f0_s390x",
"product_id": "rhacm2/multiclusterhub-rhel9@sha256:0460beb9aafd8252c3ae014ce22a3274aab5dadf30c567a0fa4cecc0ee82f3f0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multiclusterhub-rhel9@sha256:0460beb9aafd8252c3ae014ce22a3274aab5dadf30c567a0fa4cecc0ee82f3f0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:e65963ff0b8c4a67d29a814902b468a59a52721678d1a134f6ea5f50c8f209ce_s390x",
"product": {
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:e65963ff0b8c4a67d29a814902b468a59a52721678d1a134f6ea5f50c8f209ce_s390x",
"product_id": "rhacm2/multicluster-observability-rhel9-operator@sha256:e65963ff0b8c4a67d29a814902b468a59a52721678d1a134f6ea5f50c8f209ce_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-observability-rhel9-operator@sha256:e65963ff0b8c4a67d29a814902b468a59a52721678d1a134f6ea5f50c8f209ce?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:5a61cd0e97b00f1ce157f52e40d08b42d70c8a8ba3ecee3d3ba1ac3b980c957d_s390x",
"product": {
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:5a61cd0e97b00f1ce157f52e40d08b42d70c8a8ba3ecee3d3ba1ac3b980c957d_s390x",
"product_id": "rhacm2/multicluster-operators-application-rhel9@sha256:5a61cd0e97b00f1ce157f52e40d08b42d70c8a8ba3ecee3d3ba1ac3b980c957d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-application-rhel9@sha256:5a61cd0e97b00f1ce157f52e40d08b42d70c8a8ba3ecee3d3ba1ac3b980c957d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:a62f63e44bdc7e260674bd97c831866ac06b0a5706a6214fe9e176d78e2acdcd_s390x",
"product": {
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:a62f63e44bdc7e260674bd97c831866ac06b0a5706a6214fe9e176d78e2acdcd_s390x",
"product_id": "rhacm2/multicluster-operators-channel-rhel9@sha256:a62f63e44bdc7e260674bd97c831866ac06b0a5706a6214fe9e176d78e2acdcd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-channel-rhel9@sha256:a62f63e44bdc7e260674bd97c831866ac06b0a5706a6214fe9e176d78e2acdcd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:35396b89fef7697a90638cff6b3d3f470b50efd1e338231082d9981b078352c0_s390x",
"product": {
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:35396b89fef7697a90638cff6b3d3f470b50efd1e338231082d9981b078352c0_s390x",
"product_id": "rhacm2/multicluster-operators-subscription-rhel9@sha256:35396b89fef7697a90638cff6b3d3f470b50efd1e338231082d9981b078352c0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-operators-subscription-rhel9@sha256:35396b89fef7697a90638cff6b3d3f470b50efd1e338231082d9981b078352c0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/node-exporter-rhel9@sha256:dc674aeba7abddfaae287c6b65b4915b97da4ee8b7f52c539d7532112e819332_s390x",
"product": {
"name": "rhacm2/node-exporter-rhel9@sha256:dc674aeba7abddfaae287c6b65b4915b97da4ee8b7f52c539d7532112e819332_s390x",
"product_id": "rhacm2/node-exporter-rhel9@sha256:dc674aeba7abddfaae287c6b65b4915b97da4ee8b7f52c539d7532112e819332_s390x",
"product_identification_helper": {
"purl": "pkg:oci/node-exporter-rhel9@sha256:dc674aeba7abddfaae287c6b65b4915b97da4ee8b7f52c539d7532112e819332?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel9\u0026tag=v2.11.2-5"
}
}
},
{
"category": "product_version",
"name": "rhacm2/observatorium-rhel9@sha256:58ac571afa7a7e568f5c149981c7f0bd9ae1396f3cbb1c19e039859fc55ace4d_s390x",
"product": {
"name": "rhacm2/observatorium-rhel9@sha256:58ac571afa7a7e568f5c149981c7f0bd9ae1396f3cbb1c19e039859fc55ace4d_s390x",
"product_id": "rhacm2/observatorium-rhel9@sha256:58ac571afa7a7e568f5c149981c7f0bd9ae1396f3cbb1c19e039859fc55ace4d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/observatorium-rhel9@sha256:58ac571afa7a7e568f5c149981c7f0bd9ae1396f3cbb1c19e039859fc55ace4d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/observatorium-rhel9-operator@sha256:e3de9eca133476045f0a38062a68712214d6d7dd8dc0372ee2b03ca0b5c50e22_s390x",
"product": {
"name": "rhacm2/observatorium-rhel9-operator@sha256:e3de9eca133476045f0a38062a68712214d6d7dd8dc0372ee2b03ca0b5c50e22_s390x",
"product_id": "rhacm2/observatorium-rhel9-operator@sha256:e3de9eca133476045f0a38062a68712214d6d7dd8dc0372ee2b03ca0b5c50e22_s390x",
"product_identification_helper": {
"purl": "pkg:oci/observatorium-rhel9-operator@sha256:e3de9eca133476045f0a38062a68712214d6d7dd8dc0372ee2b03ca0b5c50e22?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9-operator\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:d87854fd2a2e3ec5fabab7b296136d04bbc9921ee9beb1c47066465bc67bc8b1_s390x",
"product": {
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:d87854fd2a2e3ec5fabab7b296136d04bbc9921ee9beb1c47066465bc67bc8b1_s390x",
"product_id": "rhacm2/prometheus-alertmanager-rhel9@sha256:d87854fd2a2e3ec5fabab7b296136d04bbc9921ee9beb1c47066465bc67bc8b1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/prometheus-alertmanager-rhel9@sha256:d87854fd2a2e3ec5fabab7b296136d04bbc9921ee9beb1c47066465bc67bc8b1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/prometheus-rhel9@sha256:0e4527ae6eb39847906895597252e5309c5c8a7517ab63abffb199bfee278800_s390x",
"product": {
"name": "rhacm2/prometheus-rhel9@sha256:0e4527ae6eb39847906895597252e5309c5c8a7517ab63abffb199bfee278800_s390x",
"product_id": "rhacm2/prometheus-rhel9@sha256:0e4527ae6eb39847906895597252e5309c5c8a7517ab63abffb199bfee278800_s390x",
"product_identification_helper": {
"purl": "pkg:oci/prometheus-rhel9@sha256:0e4527ae6eb39847906895597252e5309c5c8a7517ab63abffb199bfee278800?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:901a0b687f3f2b3285af83ad60aa70096f7d0167c0591c3344d4be147abd99b8_s390x",
"product": {
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:901a0b687f3f2b3285af83ad60aa70096f7d0167c0591c3344d4be147abd99b8_s390x",
"product_id": "rhacm2/rbac-query-proxy-rhel9@sha256:901a0b687f3f2b3285af83ad60aa70096f7d0167c0591c3344d4be147abd99b8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rbac-query-proxy-rhel9@sha256:901a0b687f3f2b3285af83ad60aa70096f7d0167c0591c3344d4be147abd99b8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/search-collector-rhel9@sha256:85e712c48e7b1fd0c9d638fefa490c7cdd75861a31fcf852270196419ece80b6_s390x",
"product": {
"name": "rhacm2/search-collector-rhel9@sha256:85e712c48e7b1fd0c9d638fefa490c7cdd75861a31fcf852270196419ece80b6_s390x",
"product_id": "rhacm2/search-collector-rhel9@sha256:85e712c48e7b1fd0c9d638fefa490c7cdd75861a31fcf852270196419ece80b6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/search-collector-rhel9@sha256:85e712c48e7b1fd0c9d638fefa490c7cdd75861a31fcf852270196419ece80b6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel9\u0026tag=v2.11.2-7"
}
}
},
{
"category": "product_version",
"name": "rhacm2/submariner-addon-rhel9@sha256:82f953a4802785218310886026a0d84e7d91682960706e9bd07b8203888d604d_s390x",
"product": {
"name": "rhacm2/submariner-addon-rhel9@sha256:82f953a4802785218310886026a0d84e7d91682960706e9bd07b8203888d604d_s390x",
"product_id": "rhacm2/submariner-addon-rhel9@sha256:82f953a4802785218310886026a0d84e7d91682960706e9bd07b8203888d604d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-addon-rhel9@sha256:82f953a4802785218310886026a0d84e7d91682960706e9bd07b8203888d604d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel9\u0026tag=v2.11.2-9"
}
}
},
{
"category": "product_version",
"name": "rhacm2/thanos-rhel9@sha256:f4edbbbc4760bb622c3b2c448689ca9c14385ddc67ce5e9c42ae1e7fc95af754_s390x",
"product": {
"name": "rhacm2/thanos-rhel9@sha256:f4edbbbc4760bb622c3b2c448689ca9c14385ddc67ce5e9c42ae1e7fc95af754_s390x",
"product_id": "rhacm2/thanos-rhel9@sha256:f4edbbbc4760bb622c3b2c448689ca9c14385ddc67ce5e9c42ae1e7fc95af754_s390x",
"product_identification_helper": {
"purl": "pkg:oci/thanos-rhel9@sha256:f4edbbbc4760bb622c3b2c448689ca9c14385ddc67ce5e9c42ae1e7fc95af754?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel9\u0026tag=v2.11.2-6"
}
}
},
{
"category": "product_version",
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:437c5c3e4159707613430dce57c9f23de2d1d69fe38b0381afad1257310bf41f_s390x",
"product": {
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:437c5c3e4159707613430dce57c9f23de2d1d69fe38b0381afad1257310bf41f_s390x",
"product_id": "rhacm2/thanos-receive-controller-rhel9@sha256:437c5c3e4159707613430dce57c9f23de2d1d69fe38b0381afad1257310bf41f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/thanos-receive-controller-rhel9@sha256:437c5c3e4159707613430dce57c9f23de2d1d69fe38b0381afad1257310bf41f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel9\u0026tag=v2.11.2-7"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:1e1bd11fb0dc8023832e136c768f79e15e4512020684d79764cb67026a54c7fe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:1e1bd11fb0dc8023832e136c768f79e15e4512020684d79764cb67026a54c7fe_s390x"
},
"product_reference": "rhacm2/acm-cluster-permission-rhel9@sha256:1e1bd11fb0dc8023832e136c768f79e15e4512020684d79764cb67026a54c7fe_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:3366c160999585e8f4c2f752f9939fd3acf40d30d94113d2636e034aabb4df9d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:3366c160999585e8f4c2f752f9939fd3acf40d30d94113d2636e034aabb4df9d_amd64"
},
"product_reference": "rhacm2/acm-cluster-permission-rhel9@sha256:3366c160999585e8f4c2f752f9939fd3acf40d30d94113d2636e034aabb4df9d_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:46963b47975ca67020b9e775645d30cfcf71a1eb1262730a5b613eb11ab0b47b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:46963b47975ca67020b9e775645d30cfcf71a1eb1262730a5b613eb11ab0b47b_ppc64le"
},
"product_reference": "rhacm2/acm-cluster-permission-rhel9@sha256:46963b47975ca67020b9e775645d30cfcf71a1eb1262730a5b613eb11ab0b47b_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-cluster-permission-rhel9@sha256:b8cfd03917d420a22661ae336631f431d914cdb2d40988d5a1986613ff9e12fe_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:b8cfd03917d420a22661ae336631f431d914cdb2d40988d5a1986613ff9e12fe_arm64"
},
"product_reference": "rhacm2/acm-cluster-permission-rhel9@sha256:b8cfd03917d420a22661ae336631f431d914cdb2d40988d5a1986613ff9e12fe_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:19e0efc68f3a4070f8e1fe42a57e8ebc752fcc46d381d86009245419b0c9623e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:19e0efc68f3a4070f8e1fe42a57e8ebc752fcc46d381d86009245419b0c9623e_ppc64le"
},
"product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:19e0efc68f3a4070f8e1fe42a57e8ebc752fcc46d381d86009245419b0c9623e_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:5d4e34144a88f91c88096202569cd92200e9a47fb76adb31e44ed0e48c20a9fe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:5d4e34144a88f91c88096202569cd92200e9a47fb76adb31e44ed0e48c20a9fe_s390x"
},
"product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:5d4e34144a88f91c88096202569cd92200e9a47fb76adb31e44ed0e48c20a9fe_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:a0f4ccde61fdd2a763d2c7fbb3f5ac5b2814260b386172c1540fec8ad98f55c9_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:a0f4ccde61fdd2a763d2c7fbb3f5ac5b2814260b386172c1540fec8ad98f55c9_arm64"
},
"product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:a0f4ccde61fdd2a763d2c7fbb3f5ac5b2814260b386172c1540fec8ad98f55c9_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d0ab5b9c78a4e0edf6c631d5b19052b17e551dc6a5a522adf29c94ee24e2d0aa_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d0ab5b9c78a4e0edf6c631d5b19052b17e551dc6a5a522adf29c94ee24e2d0aa_amd64"
},
"product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d0ab5b9c78a4e0edf6c631d5b19052b17e551dc6a5a522adf29c94ee24e2d0aa_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:0cce3fe4592dea79eb43bb19810850135f077ca64d71a7ad3dbd5f147db2e790_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:0cce3fe4592dea79eb43bb19810850135f077ca64d71a7ad3dbd5f147db2e790_amd64"
},
"product_reference": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:0cce3fe4592dea79eb43bb19810850135f077ca64d71a7ad3dbd5f147db2e790_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:75e95cb72359a7fe830a1371b9ce6b09a944e62847037759b4aed0d3cd4be7d0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:75e95cb72359a7fe830a1371b9ce6b09a944e62847037759b4aed0d3cd4be7d0_s390x"
},
"product_reference": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:75e95cb72359a7fe830a1371b9ce6b09a944e62847037759b4aed0d3cd4be7d0_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:ab3d986a20ce852646911f5b388d3cb706257a054a065c6f8b75d9a03644aaab_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:ab3d986a20ce852646911f5b388d3cb706257a054a065c6f8b75d9a03644aaab_arm64"
},
"product_reference": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:ab3d986a20ce852646911f5b388d3cb706257a054a065c6f8b75d9a03644aaab_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:d60a8a429f162cef2ab47752fe18acd72f5eade4b93a75702db9b9cc8da7d674_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:d60a8a429f162cef2ab47752fe18acd72f5eade4b93a75702db9b9cc8da7d674_ppc64le"
},
"product_reference": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:d60a8a429f162cef2ab47752fe18acd72f5eade4b93a75702db9b9cc8da7d674_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-grafana-rhel9@sha256:5f63690edba4da9bc0a8aebb05a5b13a0cd21853fa416474aa030af8608a0d6c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:5f63690edba4da9bc0a8aebb05a5b13a0cd21853fa416474aa030af8608a0d6c_ppc64le"
},
"product_reference": "rhacm2/acm-grafana-rhel9@sha256:5f63690edba4da9bc0a8aebb05a5b13a0cd21853fa416474aa030af8608a0d6c_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-grafana-rhel9@sha256:a5389c1f2e2cffbe9c3486f3515174c8dfb0a21e5d34756d7febaf366adc91d1_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:a5389c1f2e2cffbe9c3486f3515174c8dfb0a21e5d34756d7febaf366adc91d1_arm64"
},
"product_reference": "rhacm2/acm-grafana-rhel9@sha256:a5389c1f2e2cffbe9c3486f3515174c8dfb0a21e5d34756d7febaf366adc91d1_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-grafana-rhel9@sha256:d2293b739ca6fcc5fe4663627f033d4a2b62e5f48bd9d0f3e9db7618305eecd5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:d2293b739ca6fcc5fe4663627f033d4a2b62e5f48bd9d0f3e9db7618305eecd5_amd64"
},
"product_reference": "rhacm2/acm-grafana-rhel9@sha256:d2293b739ca6fcc5fe4663627f033d4a2b62e5f48bd9d0f3e9db7618305eecd5_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-grafana-rhel9@sha256:fccbd02c7ff5f4b9b6db304fc92c9eb0627c18e725f2f1bc0cd7bbca3c721663_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:fccbd02c7ff5f4b9b6db304fc92c9eb0627c18e725f2f1bc0cd7bbca3c721663_s390x"
},
"product_reference": "rhacm2/acm-grafana-rhel9@sha256:fccbd02c7ff5f4b9b6db304fc92c9eb0627c18e725f2f1bc0cd7bbca3c721663_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-must-gather-rhel9@sha256:0bd298d6a49fc3a96be591912355d6ab966fa00d74068aef59222c6f147a3226_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:0bd298d6a49fc3a96be591912355d6ab966fa00d74068aef59222c6f147a3226_arm64"
},
"product_reference": "rhacm2/acm-must-gather-rhel9@sha256:0bd298d6a49fc3a96be591912355d6ab966fa00d74068aef59222c6f147a3226_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-must-gather-rhel9@sha256:102aade20bd47f3e5e34dbbacb4a47a2862dd285a5247bc4b661102a24ff6854_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:102aade20bd47f3e5e34dbbacb4a47a2862dd285a5247bc4b661102a24ff6854_amd64"
},
"product_reference": "rhacm2/acm-must-gather-rhel9@sha256:102aade20bd47f3e5e34dbbacb4a47a2862dd285a5247bc4b661102a24ff6854_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-must-gather-rhel9@sha256:4f18e4d08b07aefaed137ca815e4b87d8e7b9a9d9b36b015ef5b78e148c84834_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:4f18e4d08b07aefaed137ca815e4b87d8e7b9a9d9b36b015ef5b78e148c84834_ppc64le"
},
"product_reference": "rhacm2/acm-must-gather-rhel9@sha256:4f18e4d08b07aefaed137ca815e4b87d8e7b9a9d9b36b015ef5b78e148c84834_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-must-gather-rhel9@sha256:b55d451073609d4a5ea9bccb48983bad29eae13b975135e9e64a24083e1e7aa9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:b55d451073609d4a5ea9bccb48983bad29eae13b975135e9e64a24083e1e7aa9_s390x"
},
"product_reference": "rhacm2/acm-must-gather-rhel9@sha256:b55d451073609d4a5ea9bccb48983bad29eae13b975135e9e64a24083e1e7aa9_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-operator-bundle@sha256:01b2ffd6957b812fdcbe1a11980a7904c512461c7e39a3b3d6db254067122a83_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:01b2ffd6957b812fdcbe1a11980a7904c512461c7e39a3b3d6db254067122a83_s390x"
},
"product_reference": "rhacm2/acm-operator-bundle@sha256:01b2ffd6957b812fdcbe1a11980a7904c512461c7e39a3b3d6db254067122a83_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-operator-bundle@sha256:0b7d0b1d3296963b1084887ced17ebb31d0c5e7eb612a2e2fe9c37f37f456ff0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:0b7d0b1d3296963b1084887ced17ebb31d0c5e7eb612a2e2fe9c37f37f456ff0_amd64"
},
"product_reference": "rhacm2/acm-operator-bundle@sha256:0b7d0b1d3296963b1084887ced17ebb31d0c5e7eb612a2e2fe9c37f37f456ff0_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-operator-bundle@sha256:57fbe046aa7bf06d38942e3ad3b3d0c6cb836b6111a5c8b6577c253cbdc45175_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:57fbe046aa7bf06d38942e3ad3b3d0c6cb836b6111a5c8b6577c253cbdc45175_ppc64le"
},
"product_reference": "rhacm2/acm-operator-bundle@sha256:57fbe046aa7bf06d38942e3ad3b3d0c6cb836b6111a5c8b6577c253cbdc45175_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5ea1c78750ee4c2e9fb17b3ea3433eafbb615616209dd6f4e7984e7f6095e2ee_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5ea1c78750ee4c2e9fb17b3ea3433eafbb615616209dd6f4e7984e7f6095e2ee_arm64"
},
"product_reference": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5ea1c78750ee4c2e9fb17b3ea3433eafbb615616209dd6f4e7984e7f6095e2ee_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:6f49205e572e2de9fb80cd4581d6d29ffd5c87dad007f410c9c2035984ea065d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:6f49205e572e2de9fb80cd4581d6d29ffd5c87dad007f410c9c2035984ea065d_ppc64le"
},
"product_reference": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:6f49205e572e2de9fb80cd4581d6d29ffd5c87dad007f410c9c2035984ea065d_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:902e1286a164470fdfea20e8ed19a1e8be2aac4ff8ace09df1101a61afa71a7a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:902e1286a164470fdfea20e8ed19a1e8be2aac4ff8ace09df1101a61afa71a7a_s390x"
},
"product_reference": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:902e1286a164470fdfea20e8ed19a1e8be2aac4ff8ace09df1101a61afa71a7a_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:ae2b8b404a744fe0ba5d5b3a2a294b06f4f420765f42e34a3207333c12360a07_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:ae2b8b404a744fe0ba5d5b3a2a294b06f4f420765f42e34a3207333c12360a07_amd64"
},
"product_reference": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:ae2b8b404a744fe0ba5d5b3a2a294b06f4f420765f42e34a3207333c12360a07_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-prometheus-rhel9@sha256:579b7f728cf4878e7e7cc804e59f575433db4e22a1ee5fb38142d20f1c51f15e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:579b7f728cf4878e7e7cc804e59f575433db4e22a1ee5fb38142d20f1c51f15e_ppc64le"
},
"product_reference": "rhacm2/acm-prometheus-rhel9@sha256:579b7f728cf4878e7e7cc804e59f575433db4e22a1ee5fb38142d20f1c51f15e_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-prometheus-rhel9@sha256:a706778ba70694ba05bcdf705b64d7ab1887760a4f2b88f591d6b32f1108c7cf_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a706778ba70694ba05bcdf705b64d7ab1887760a4f2b88f591d6b32f1108c7cf_amd64"
},
"product_reference": "rhacm2/acm-prometheus-rhel9@sha256:a706778ba70694ba05bcdf705b64d7ab1887760a4f2b88f591d6b32f1108c7cf_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-prometheus-rhel9@sha256:b120cb215382640a2656b9f8e4c4838cdf87dde769bee126f728cf7fd82f6dff_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:b120cb215382640a2656b9f8e4c4838cdf87dde769bee126f728cf7fd82f6dff_s390x"
},
"product_reference": "rhacm2/acm-prometheus-rhel9@sha256:b120cb215382640a2656b9f8e4c4838cdf87dde769bee126f728cf7fd82f6dff_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-prometheus-rhel9@sha256:e0fc8a5f49eb7f510aa8a850cf56db7ef97d1de18e23d474eb9514bea5dada30_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:e0fc8a5f49eb7f510aa8a850cf56db7ef97d1de18e23d474eb9514bea5dada30_arm64"
},
"product_reference": "rhacm2/acm-prometheus-rhel9@sha256:e0fc8a5f49eb7f510aa8a850cf56db7ef97d1de18e23d474eb9514bea5dada30_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-indexer-rhel9@sha256:2113e6d7913d712792ff92c5c79d13a7bd54750b0891327f97cee18c380ac45c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:2113e6d7913d712792ff92c5c79d13a7bd54750b0891327f97cee18c380ac45c_amd64"
},
"product_reference": "rhacm2/acm-search-indexer-rhel9@sha256:2113e6d7913d712792ff92c5c79d13a7bd54750b0891327f97cee18c380ac45c_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-indexer-rhel9@sha256:26652d400f561ba913729bc99b1de27e7acdb6f2b768050cf9656f9daccf6cd9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:26652d400f561ba913729bc99b1de27e7acdb6f2b768050cf9656f9daccf6cd9_ppc64le"
},
"product_reference": "rhacm2/acm-search-indexer-rhel9@sha256:26652d400f561ba913729bc99b1de27e7acdb6f2b768050cf9656f9daccf6cd9_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-indexer-rhel9@sha256:b7f960bffccc1a431f3094a730f773437648abdcddad489fef09f4c89eb88f8a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b7f960bffccc1a431f3094a730f773437648abdcddad489fef09f4c89eb88f8a_s390x"
},
"product_reference": "rhacm2/acm-search-indexer-rhel9@sha256:b7f960bffccc1a431f3094a730f773437648abdcddad489fef09f4c89eb88f8a_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-indexer-rhel9@sha256:bcc7fb0186b3ee839752d6df30b1e8fb33a4f9e5cec463c53998b677a7666c35_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:bcc7fb0186b3ee839752d6df30b1e8fb33a4f9e5cec463c53998b677a7666c35_arm64"
},
"product_reference": "rhacm2/acm-search-indexer-rhel9@sha256:bcc7fb0186b3ee839752d6df30b1e8fb33a4f9e5cec463c53998b677a7666c35_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:037e5d2d019d97afd20a6a39961ebd0ca6c88e67ab5346be653cd46ac6f2489d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:037e5d2d019d97afd20a6a39961ebd0ca6c88e67ab5346be653cd46ac6f2489d_arm64"
},
"product_reference": "rhacm2/acm-search-v2-api-rhel9@sha256:037e5d2d019d97afd20a6a39961ebd0ca6c88e67ab5346be653cd46ac6f2489d_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:7d214a186e82d4fb534c18dd026b6eb577bcf83bbe3c47550d9d2e234218138f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:7d214a186e82d4fb534c18dd026b6eb577bcf83bbe3c47550d9d2e234218138f_amd64"
},
"product_reference": "rhacm2/acm-search-v2-api-rhel9@sha256:7d214a186e82d4fb534c18dd026b6eb577bcf83bbe3c47550d9d2e234218138f_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:eaeeca4d836f8c347aea55dd3c39f3761b492a05a8db43276b85cd60a4f2d709_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:eaeeca4d836f8c347aea55dd3c39f3761b492a05a8db43276b85cd60a4f2d709_ppc64le"
},
"product_reference": "rhacm2/acm-search-v2-api-rhel9@sha256:eaeeca4d836f8c347aea55dd3c39f3761b492a05a8db43276b85cd60a4f2d709_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-v2-api-rhel9@sha256:fd7033e1202e6a129cccac9e682c1b0ebbcdc577f0a1a62491af213b1a2754d7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fd7033e1202e6a129cccac9e682c1b0ebbcdc577f0a1a62491af213b1a2754d7_s390x"
},
"product_reference": "rhacm2/acm-search-v2-api-rhel9@sha256:fd7033e1202e6a129cccac9e682c1b0ebbcdc577f0a1a62491af213b1a2754d7_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-v2-rhel9@sha256:4436bfd5acbf25128a0ffa97a6fe54db3917fc2e5843bac38fd415453077f527_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:4436bfd5acbf25128a0ffa97a6fe54db3917fc2e5843bac38fd415453077f527_amd64"
},
"product_reference": "rhacm2/acm-search-v2-rhel9@sha256:4436bfd5acbf25128a0ffa97a6fe54db3917fc2e5843bac38fd415453077f527_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-v2-rhel9@sha256:832513a662fc4062b977857c548102efb1ddca6f1d77957dd2a9bdb8e21b92b2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:832513a662fc4062b977857c548102efb1ddca6f1d77957dd2a9bdb8e21b92b2_arm64"
},
"product_reference": "rhacm2/acm-search-v2-rhel9@sha256:832513a662fc4062b977857c548102efb1ddca6f1d77957dd2a9bdb8e21b92b2_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-v2-rhel9@sha256:b84c3be0f657bdcf774bb52a5a84d04da9f696786bcd78c73ed21397846db46d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:b84c3be0f657bdcf774bb52a5a84d04da9f696786bcd78c73ed21397846db46d_s390x"
},
"product_reference": "rhacm2/acm-search-v2-rhel9@sha256:b84c3be0f657bdcf774bb52a5a84d04da9f696786bcd78c73ed21397846db46d_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-search-v2-rhel9@sha256:e02cc7128940815e916578e0f9ba899b47961e659afa861de1c58bbd2d7f1381_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:e02cc7128940815e916578e0f9ba899b47961e659afa861de1c58bbd2d7f1381_ppc64le"
},
"product_reference": "rhacm2/acm-search-v2-rhel9@sha256:e02cc7128940815e916578e0f9ba899b47961e659afa861de1c58bbd2d7f1381_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:b65b749a71b5fb4e88c766125ef5300ddbb1091de66317f2e36a7b6fd1c24dcd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:b65b749a71b5fb4e88c766125ef5300ddbb1091de66317f2e36a7b6fd1c24dcd_ppc64le"
},
"product_reference": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:b65b749a71b5fb4e88c766125ef5300ddbb1091de66317f2e36a7b6fd1c24dcd_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:c9e0b72dbb4d189a4af8710e4eb1939c0bcbc0c64829d63999faf88ee01471c9_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c9e0b72dbb4d189a4af8710e4eb1939c0bcbc0c64829d63999faf88ee01471c9_arm64"
},
"product_reference": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:c9e0b72dbb4d189a4af8710e4eb1939c0bcbc0c64829d63999faf88ee01471c9_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:d3104d2297bdc2fe3f660c3c0a8b0220dd34b9adedd7b5ff0177984eb013a41d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:d3104d2297bdc2fe3f660c3c0a8b0220dd34b9adedd7b5ff0177984eb013a41d_s390x"
},
"product_reference": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:d3104d2297bdc2fe3f660c3c0a8b0220dd34b9adedd7b5ff0177984eb013a41d_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:ffa283d1841f5993c8a7efa17ecdbac722a16125c581309cc75e32167831bb81_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:ffa283d1841f5993c8a7efa17ecdbac722a16125c581309cc75e32167831bb81_amd64"
},
"product_reference": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:ffa283d1841f5993c8a7efa17ecdbac722a16125c581309cc75e32167831bb81_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/cert-policy-controller-rhel9@sha256:51ca0179fdfa587ead4e4c368713ad043969cc9157bb0e3fcf9421bfd1459f09_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:51ca0179fdfa587ead4e4c368713ad043969cc9157bb0e3fcf9421bfd1459f09_arm64"
},
"product_reference": "rhacm2/cert-policy-controller-rhel9@sha256:51ca0179fdfa587ead4e4c368713ad043969cc9157bb0e3fcf9421bfd1459f09_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/cert-policy-controller-rhel9@sha256:b421b0785565d4bb573fae2ade2271d8985524981e67f8fa6be3dda042b8d8fd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:b421b0785565d4bb573fae2ade2271d8985524981e67f8fa6be3dda042b8d8fd_amd64"
},
"product_reference": "rhacm2/cert-policy-controller-rhel9@sha256:b421b0785565d4bb573fae2ade2271d8985524981e67f8fa6be3dda042b8d8fd_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/cert-policy-controller-rhel9@sha256:b4eed47f93eec2c1236fdd3fc00d3e7d5b71724acbd90f0d974ae5209226d0e5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:b4eed47f93eec2c1236fdd3fc00d3e7d5b71724acbd90f0d974ae5209226d0e5_ppc64le"
},
"product_reference": "rhacm2/cert-policy-controller-rhel9@sha256:b4eed47f93eec2c1236fdd3fc00d3e7d5b71724acbd90f0d974ae5209226d0e5_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/cert-policy-controller-rhel9@sha256:f7fa4d19cc00a6858df774d335a9423623f1e5cff2429ca75f21876988333c0c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:f7fa4d19cc00a6858df774d335a9423623f1e5cff2429ca75f21876988333c0c_s390x"
},
"product_reference": "rhacm2/cert-policy-controller-rhel9@sha256:f7fa4d19cc00a6858df774d335a9423623f1e5cff2429ca75f21876988333c0c_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:313cde7df3fd7048455e3d14574c3379c61fb4f09f08892d376ca4fe81b4ec88_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:313cde7df3fd7048455e3d14574c3379c61fb4f09f08892d376ca4fe81b4ec88_arm64"
},
"product_reference": "rhacm2/cluster-backup-rhel9-operator@sha256:313cde7df3fd7048455e3d14574c3379c61fb4f09f08892d376ca4fe81b4ec88_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:969f519ff9b78ac6754857426b9b3fcd00a055e61bd9831e1ea5569f55ccb1ab_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:969f519ff9b78ac6754857426b9b3fcd00a055e61bd9831e1ea5569f55ccb1ab_s390x"
},
"product_reference": "rhacm2/cluster-backup-rhel9-operator@sha256:969f519ff9b78ac6754857426b9b3fcd00a055e61bd9831e1ea5569f55ccb1ab_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:f5f85025adc32a867f671ec774a2dcd40b0fce602ead3d38c6333e870c9a494d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f5f85025adc32a867f671ec774a2dcd40b0fce602ead3d38c6333e870c9a494d_amd64"
},
"product_reference": "rhacm2/cluster-backup-rhel9-operator@sha256:f5f85025adc32a867f671ec774a2dcd40b0fce602ead3d38c6333e870c9a494d_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/cluster-backup-rhel9-operator@sha256:f86562dc7d33fbeb46aeca54e7ebab5c1419557de19e0c009212e9ffd17b8009_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f86562dc7d33fbeb46aeca54e7ebab5c1419557de19e0c009212e9ffd17b8009_ppc64le"
},
"product_reference": "rhacm2/cluster-backup-rhel9-operator@sha256:f86562dc7d33fbeb46aeca54e7ebab5c1419557de19e0c009212e9ffd17b8009_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/config-policy-controller-rhel9@sha256:2fa53a7c9f4bb4c5b4ef237a3e33bfe56c5f7d8b9949fec6da90a0579ee5c1a5_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:2fa53a7c9f4bb4c5b4ef237a3e33bfe56c5f7d8b9949fec6da90a0579ee5c1a5_arm64"
},
"product_reference": "rhacm2/config-policy-controller-rhel9@sha256:2fa53a7c9f4bb4c5b4ef237a3e33bfe56c5f7d8b9949fec6da90a0579ee5c1a5_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/config-policy-controller-rhel9@sha256:3f6260c4873940c679a97365400e03eac234568e18e8cf82aaa6d413b42f3d9d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:3f6260c4873940c679a97365400e03eac234568e18e8cf82aaa6d413b42f3d9d_amd64"
},
"product_reference": "rhacm2/config-policy-controller-rhel9@sha256:3f6260c4873940c679a97365400e03eac234568e18e8cf82aaa6d413b42f3d9d_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/config-policy-controller-rhel9@sha256:7e32333dc0744b6447f901d249a58c45e67d4328e5be45a9cb113e457ecda5db_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:7e32333dc0744b6447f901d249a58c45e67d4328e5be45a9cb113e457ecda5db_s390x"
},
"product_reference": "rhacm2/config-policy-controller-rhel9@sha256:7e32333dc0744b6447f901d249a58c45e67d4328e5be45a9cb113e457ecda5db_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/config-policy-controller-rhel9@sha256:a766c37590801c0bdfb09c6af7339f1c11f2f7305a40798697187d8bc2714546_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:a766c37590801c0bdfb09c6af7339f1c11f2f7305a40798697187d8bc2714546_ppc64le"
},
"product_reference": "rhacm2/config-policy-controller-rhel9@sha256:a766c37590801c0bdfb09c6af7339f1c11f2f7305a40798697187d8bc2714546_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/console-rhel9@sha256:68aed58064888b890b0771358eab07348814a5f6fdeb6e8b410e49cf2c690253_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:68aed58064888b890b0771358eab07348814a5f6fdeb6e8b410e49cf2c690253_ppc64le"
},
"product_reference": "rhacm2/console-rhel9@sha256:68aed58064888b890b0771358eab07348814a5f6fdeb6e8b410e49cf2c690253_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/console-rhel9@sha256:a7f07d46f4cda207815def9d9e1fe5bb45550ddcc026d4bfabd361265c77465b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:a7f07d46f4cda207815def9d9e1fe5bb45550ddcc026d4bfabd361265c77465b_s390x"
},
"product_reference": "rhacm2/console-rhel9@sha256:a7f07d46f4cda207815def9d9e1fe5bb45550ddcc026d4bfabd361265c77465b_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/console-rhel9@sha256:c58b30b96e0a63fa389cdf9c3dbc8d4518efd955d74bb39e0d19c58b67622995_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c58b30b96e0a63fa389cdf9c3dbc8d4518efd955d74bb39e0d19c58b67622995_amd64"
},
"product_reference": "rhacm2/console-rhel9@sha256:c58b30b96e0a63fa389cdf9c3dbc8d4518efd955d74bb39e0d19c58b67622995_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/console-rhel9@sha256:dd15df86f85136d26e97301861bdba147dfacea08b8cf09dc56910bf1e687ae1_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:dd15df86f85136d26e97301861bdba147dfacea08b8cf09dc56910bf1e687ae1_arm64"
},
"product_reference": "rhacm2/console-rhel9@sha256:dd15df86f85136d26e97301861bdba147dfacea08b8cf09dc56910bf1e687ae1_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:7d128aba7603a33a67ef0f67f560c5afd929cd78e2d3bf24a5958cbcc8b70661_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:7d128aba7603a33a67ef0f67f560c5afd929cd78e2d3bf24a5958cbcc8b70661_amd64"
},
"product_reference": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:7d128aba7603a33a67ef0f67f560c5afd929cd78e2d3bf24a5958cbcc8b70661_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:7f982f2d6f649ecf2e97e9b6c7b86f4e8bbf7f2c8ba0bbd1656a84d2123764ac_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:7f982f2d6f649ecf2e97e9b6c7b86f4e8bbf7f2c8ba0bbd1656a84d2123764ac_arm64"
},
"product_reference": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:7f982f2d6f649ecf2e97e9b6c7b86f4e8bbf7f2c8ba0bbd1656a84d2123764ac_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:970bcea18b3222206505546f59dd33f0bb272995a001d4d2f46fa52d3c26fad1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:970bcea18b3222206505546f59dd33f0bb272995a001d4d2f46fa52d3c26fad1_s390x"
},
"product_reference": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:970bcea18b3222206505546f59dd33f0bb272995a001d4d2f46fa52d3c26fad1_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:fbdc67f341dfdd5e6b0b69ab9ae11fa9852bef0e49d2776abec698894716766e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:fbdc67f341dfdd5e6b0b69ab9ae11fa9852bef0e49d2776abec698894716766e_ppc64le"
},
"product_reference": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:fbdc67f341dfdd5e6b0b69ab9ae11fa9852bef0e49d2776abec698894716766e_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:5d390cda6fee76c914d1bf38ea367eda83e06421a8dc9d5c17db128e99ced452_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:5d390cda6fee76c914d1bf38ea367eda83e06421a8dc9d5c17db128e99ced452_ppc64le"
},
"product_reference": "rhacm2/governance-policy-propagator-rhel9@sha256:5d390cda6fee76c914d1bf38ea367eda83e06421a8dc9d5c17db128e99ced452_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:a4ca90b6eaff84c204833b5487f8b57a8ac25745366e3d6ba2b1ba9555e0b4b9_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:a4ca90b6eaff84c204833b5487f8b57a8ac25745366e3d6ba2b1ba9555e0b4b9_arm64"
},
"product_reference": "rhacm2/governance-policy-propagator-rhel9@sha256:a4ca90b6eaff84c204833b5487f8b57a8ac25745366e3d6ba2b1ba9555e0b4b9_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:ba2294c81af7e74a2f9757873f289c2bfa50cf1b90303ee849c36f3bbaf0a629_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:ba2294c81af7e74a2f9757873f289c2bfa50cf1b90303ee849c36f3bbaf0a629_s390x"
},
"product_reference": "rhacm2/governance-policy-propagator-rhel9@sha256:ba2294c81af7e74a2f9757873f289c2bfa50cf1b90303ee849c36f3bbaf0a629_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/governance-policy-propagator-rhel9@sha256:fbcad76f88280d74f8cc70a0a8f4eabc1b3562d814264c00c4aeace65ddd1685_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:fbcad76f88280d74f8cc70a0a8f4eabc1b3562d814264c00c4aeace65ddd1685_amd64"
},
"product_reference": "rhacm2/governance-policy-propagator-rhel9@sha256:fbcad76f88280d74f8cc70a0a8f4eabc1b3562d814264c00c4aeace65ddd1685_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:07f3c4ff8a1066f0d96209a993a781c93c84cbaff45884a466c48cdb04f2ee0f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:07f3c4ff8a1066f0d96209a993a781c93c84cbaff45884a466c48cdb04f2ee0f_s390x"
},
"product_reference": "rhacm2/grafana-dashboard-loader-rhel9@sha256:07f3c4ff8a1066f0d96209a993a781c93c84cbaff45884a466c48cdb04f2ee0f_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:5d41854e1cf846fb873df62ff19f8c6769a762e7ab10c59e31a7256fdc024141_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5d41854e1cf846fb873df62ff19f8c6769a762e7ab10c59e31a7256fdc024141_ppc64le"
},
"product_reference": "rhacm2/grafana-dashboard-loader-rhel9@sha256:5d41854e1cf846fb873df62ff19f8c6769a762e7ab10c59e31a7256fdc024141_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:7d73618e4322772f099856e6721913a74e49571c5193bbd6d70e0151deda85b5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:7d73618e4322772f099856e6721913a74e49571c5193bbd6d70e0151deda85b5_amd64"
},
"product_reference": "rhacm2/grafana-dashboard-loader-rhel9@sha256:7d73618e4322772f099856e6721913a74e49571c5193bbd6d70e0151deda85b5_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:9a1cd526bdf8206047baa7aa966efbdf3f68d349a193a37a7361af584c73a514_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:9a1cd526bdf8206047baa7aa966efbdf3f68d349a193a37a7361af584c73a514_arm64"
},
"product_reference": "rhacm2/grafana-dashboard-loader-rhel9@sha256:9a1cd526bdf8206047baa7aa966efbdf3f68d349a193a37a7361af584c73a514_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/insights-client-rhel9@sha256:2c0368006980f837171e02f424046c43c64a18d64c952304cde5101651c1eef1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:2c0368006980f837171e02f424046c43c64a18d64c952304cde5101651c1eef1_ppc64le"
},
"product_reference": "rhacm2/insights-client-rhel9@sha256:2c0368006980f837171e02f424046c43c64a18d64c952304cde5101651c1eef1_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/insights-client-rhel9@sha256:7e2c1db62bb662bd592bfc4f905d4d6fbe8bcc5ec7b204ed5fc821855dd04475_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:7e2c1db62bb662bd592bfc4f905d4d6fbe8bcc5ec7b204ed5fc821855dd04475_arm64"
},
"product_reference": "rhacm2/insights-client-rhel9@sha256:7e2c1db62bb662bd592bfc4f905d4d6fbe8bcc5ec7b204ed5fc821855dd04475_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/insights-client-rhel9@sha256:cd8046e4690fb132c8b4729a7cd903d22c342cc490c52452a511993d89eb8ce8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:cd8046e4690fb132c8b4729a7cd903d22c342cc490c52452a511993d89eb8ce8_s390x"
},
"product_reference": "rhacm2/insights-client-rhel9@sha256:cd8046e4690fb132c8b4729a7cd903d22c342cc490c52452a511993d89eb8ce8_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/insights-client-rhel9@sha256:d5be048bb89baced719de180540409e23f0189405021fb14c738ee5497d379fe_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:d5be048bb89baced719de180540409e23f0189405021fb14c738ee5497d379fe_amd64"
},
"product_reference": "rhacm2/insights-client-rhel9@sha256:d5be048bb89baced719de180540409e23f0189405021fb14c738ee5497d379fe_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/insights-metrics-rhel9@sha256:597a1c9f2313e7029813559f32b771ac9101d0dc3fa69e9bbe2074ad3749c9f8_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:597a1c9f2313e7029813559f32b771ac9101d0dc3fa69e9bbe2074ad3749c9f8_arm64"
},
"product_reference": "rhacm2/insights-metrics-rhel9@sha256:597a1c9f2313e7029813559f32b771ac9101d0dc3fa69e9bbe2074ad3749c9f8_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/insights-metrics-rhel9@sha256:8a94a49a86e0ad8c316ca4ccfe22057c4de600a7a6348fde4cb9a074ced4b11d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:8a94a49a86e0ad8c316ca4ccfe22057c4de600a7a6348fde4cb9a074ced4b11d_amd64"
},
"product_reference": "rhacm2/insights-metrics-rhel9@sha256:8a94a49a86e0ad8c316ca4ccfe22057c4de600a7a6348fde4cb9a074ced4b11d_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/insights-metrics-rhel9@sha256:91f5e194946f1e722ad77cf239b9186000d4620a0539694231470f9e37ee7b9c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:91f5e194946f1e722ad77cf239b9186000d4620a0539694231470f9e37ee7b9c_ppc64le"
},
"product_reference": "rhacm2/insights-metrics-rhel9@sha256:91f5e194946f1e722ad77cf239b9186000d4620a0539694231470f9e37ee7b9c_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/insights-metrics-rhel9@sha256:b2b6664a341979132fb48dfaccf5928d3364f67ae208c5bcc7e371b6daf76c02_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:b2b6664a341979132fb48dfaccf5928d3364f67ae208c5bcc7e371b6daf76c02_s390x"
},
"product_reference": "rhacm2/insights-metrics-rhel9@sha256:b2b6664a341979132fb48dfaccf5928d3364f67ae208c5bcc7e371b6daf76c02_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:1053810a6051c998474ffecb0edf869d0a9f7b5491a01b0901dc46b7e10d3471_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:1053810a6051c998474ffecb0edf869d0a9f7b5491a01b0901dc46b7e10d3471_amd64"
},
"product_reference": "rhacm2/klusterlet-addon-controller-rhel9@sha256:1053810a6051c998474ffecb0edf869d0a9f7b5491a01b0901dc46b7e10d3471_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:1c292aa57a0df6b2454087b2c28ac8ceb15a4f38ba6167f89c065c96288dae22_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:1c292aa57a0df6b2454087b2c28ac8ceb15a4f38ba6167f89c065c96288dae22_arm64"
},
"product_reference": "rhacm2/klusterlet-addon-controller-rhel9@sha256:1c292aa57a0df6b2454087b2c28ac8ceb15a4f38ba6167f89c065c96288dae22_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:68515253395e83121bdb0f46b34d20139be3f2f2857dc9bd5969808d93b19101_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:68515253395e83121bdb0f46b34d20139be3f2f2857dc9bd5969808d93b19101_s390x"
},
"product_reference": "rhacm2/klusterlet-addon-controller-rhel9@sha256:68515253395e83121bdb0f46b34d20139be3f2f2857dc9bd5969808d93b19101_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:8dfd2e7838078b8cd16a79acef292f542c1b2f2ff658e8b8d8675975d4949c83_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:8dfd2e7838078b8cd16a79acef292f542c1b2f2ff658e8b8d8675975d4949c83_ppc64le"
},
"product_reference": "rhacm2/klusterlet-addon-controller-rhel9@sha256:8dfd2e7838078b8cd16a79acef292f542c1b2f2ff658e8b8d8675975d4949c83_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:1a774795c355aaf54aa68465df0dbc979038f71e4d758564dcfe6bbe68add37b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1a774795c355aaf54aa68465df0dbc979038f71e4d758564dcfe6bbe68add37b_s390x"
},
"product_reference": "rhacm2/kube-rbac-proxy-rhel9@sha256:1a774795c355aaf54aa68465df0dbc979038f71e4d758564dcfe6bbe68add37b_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:5866e1a7df1766e0eee840ee52e1ff6d72fd8f1ce9592d170b6dac87030bb1ba_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:5866e1a7df1766e0eee840ee52e1ff6d72fd8f1ce9592d170b6dac87030bb1ba_amd64"
},
"product_reference": "rhacm2/kube-rbac-proxy-rhel9@sha256:5866e1a7df1766e0eee840ee52e1ff6d72fd8f1ce9592d170b6dac87030bb1ba_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:7c8d19c50a8c067702866679ca5609fc7ef45781e6934ad30c9897d632f017f2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:7c8d19c50a8c067702866679ca5609fc7ef45781e6934ad30c9897d632f017f2_ppc64le"
},
"product_reference": "rhacm2/kube-rbac-proxy-rhel9@sha256:7c8d19c50a8c067702866679ca5609fc7ef45781e6934ad30c9897d632f017f2_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/kube-rbac-proxy-rhel9@sha256:8db6efd9bd0c001f314840a04a3af39d90edcee2c1346595ba306a238f41400e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:8db6efd9bd0c001f314840a04a3af39d90edcee2c1346595ba306a238f41400e_arm64"
},
"product_reference": "rhacm2/kube-rbac-proxy-rhel9@sha256:8db6efd9bd0c001f314840a04a3af39d90edcee2c1346595ba306a238f41400e_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/kube-state-metrics-rhel9@sha256:17b158cd10422f13ebe511a2df7ccb19c057f60a04de029066a92fd05615c574_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:17b158cd10422f13ebe511a2df7ccb19c057f60a04de029066a92fd05615c574_arm64"
},
"product_reference": "rhacm2/kube-state-metrics-rhel9@sha256:17b158cd10422f13ebe511a2df7ccb19c057f60a04de029066a92fd05615c574_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/kube-state-metrics-rhel9@sha256:b44d391b46d3a6e8822075e9370aebaa50ba9114655e1dca1ebee30dc35bf166_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b44d391b46d3a6e8822075e9370aebaa50ba9114655e1dca1ebee30dc35bf166_amd64"
},
"product_reference": "rhacm2/kube-state-metrics-rhel9@sha256:b44d391b46d3a6e8822075e9370aebaa50ba9114655e1dca1ebee30dc35bf166_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/kube-state-metrics-rhel9@sha256:f85072dc26d07a83c243e735e1b80df866c3cfb860e48afcb10372e4e88b0c99_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:f85072dc26d07a83c243e735e1b80df866c3cfb860e48afcb10372e4e88b0c99_ppc64le"
},
"product_reference": "rhacm2/kube-state-metrics-rhel9@sha256:f85072dc26d07a83c243e735e1b80df866c3cfb860e48afcb10372e4e88b0c99_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/kube-state-metrics-rhel9@sha256:ff4787b74e906427ccc3e9d1485a55c6f3a0138a4f9fcc8dea3fea8abc25572f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:ff4787b74e906427ccc3e9d1485a55c6f3a0138a4f9fcc8dea3fea8abc25572f_s390x"
},
"product_reference": "rhacm2/kube-state-metrics-rhel9@sha256:ff4787b74e906427ccc3e9d1485a55c6f3a0138a4f9fcc8dea3fea8abc25572f_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/memcached-exporter-rhel9@sha256:4e799bc36694566e319c04b42dec3b9e707eec363aab6aa2e522f8c463d22545_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:4e799bc36694566e319c04b42dec3b9e707eec363aab6aa2e522f8c463d22545_s390x"
},
"product_reference": "rhacm2/memcached-exporter-rhel9@sha256:4e799bc36694566e319c04b42dec3b9e707eec363aab6aa2e522f8c463d22545_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/memcached-exporter-rhel9@sha256:5726663d8466d5c781da49251d0d3e37c882ffe0495f77c399847acfa65e34e6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:5726663d8466d5c781da49251d0d3e37c882ffe0495f77c399847acfa65e34e6_ppc64le"
},
"product_reference": "rhacm2/memcached-exporter-rhel9@sha256:5726663d8466d5c781da49251d0d3e37c882ffe0495f77c399847acfa65e34e6_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/memcached-exporter-rhel9@sha256:9f2428b59ef34fc9b37ea96934e327a012d7b77db07bf84c6879bf7816d81b03_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:9f2428b59ef34fc9b37ea96934e327a012d7b77db07bf84c6879bf7816d81b03_amd64"
},
"product_reference": "rhacm2/memcached-exporter-rhel9@sha256:9f2428b59ef34fc9b37ea96934e327a012d7b77db07bf84c6879bf7816d81b03_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/memcached-exporter-rhel9@sha256:c0bafe5f26253a71e5c3e0599e8074945a64166384b285dc89bf1506b933dac5_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:c0bafe5f26253a71e5c3e0599e8074945a64166384b285dc89bf1506b933dac5_arm64"
},
"product_reference": "rhacm2/memcached-exporter-rhel9@sha256:c0bafe5f26253a71e5c3e0599e8074945a64166384b285dc89bf1506b933dac5_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/memcached-rhel9@sha256:4be2f7292d3128f185ac2ff4f19f5b6e8abbb052b1d48e372bd952af52ec5602_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:4be2f7292d3128f185ac2ff4f19f5b6e8abbb052b1d48e372bd952af52ec5602_ppc64le"
},
"product_reference": "rhacm2/memcached-rhel9@sha256:4be2f7292d3128f185ac2ff4f19f5b6e8abbb052b1d48e372bd952af52ec5602_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/memcached-rhel9@sha256:9b22e7673d2ec7de761191a6b2a08e93766ada717271f3c8321323777ac390d8_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:9b22e7673d2ec7de761191a6b2a08e93766ada717271f3c8321323777ac390d8_arm64"
},
"product_reference": "rhacm2/memcached-rhel9@sha256:9b22e7673d2ec7de761191a6b2a08e93766ada717271f3c8321323777ac390d8_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/memcached-rhel9@sha256:d04a67c1b1605586ae6f3a25ea41b08ee8736960c22607b15b75d02a98f2b75a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d04a67c1b1605586ae6f3a25ea41b08ee8736960c22607b15b75d02a98f2b75a_s390x"
},
"product_reference": "rhacm2/memcached-rhel9@sha256:d04a67c1b1605586ae6f3a25ea41b08ee8736960c22607b15b75d02a98f2b75a_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/memcached-rhel9@sha256:d1166a218d844b76009456e2e4e075e1bc464d5fd7fe2392b89b0f525fabcf44_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d1166a218d844b76009456e2e4e075e1bc464d5fd7fe2392b89b0f525fabcf44_amd64"
},
"product_reference": "rhacm2/memcached-rhel9@sha256:d1166a218d844b76009456e2e4e075e1bc464d5fd7fe2392b89b0f525fabcf44_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/metrics-collector-rhel9@sha256:a417273cebecbd6765ef8cfee76842faac2e9009e21c49edf08beb1e437d045e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:a417273cebecbd6765ef8cfee76842faac2e9009e21c49edf08beb1e437d045e_ppc64le"
},
"product_reference": "rhacm2/metrics-collector-rhel9@sha256:a417273cebecbd6765ef8cfee76842faac2e9009e21c49edf08beb1e437d045e_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/metrics-collector-rhel9@sha256:cfb1610e0b3c2d09647d6257e94a8eee13520f6a5cdf015f9274be810193f757_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:cfb1610e0b3c2d09647d6257e94a8eee13520f6a5cdf015f9274be810193f757_s390x"
},
"product_reference": "rhacm2/metrics-collector-rhel9@sha256:cfb1610e0b3c2d09647d6257e94a8eee13520f6a5cdf015f9274be810193f757_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/metrics-collector-rhel9@sha256:e9cfc8f62328454027058c94530de6f4138990c69ee2403729f81cf01ccfe160_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:e9cfc8f62328454027058c94530de6f4138990c69ee2403729f81cf01ccfe160_amd64"
},
"product_reference": "rhacm2/metrics-collector-rhel9@sha256:e9cfc8f62328454027058c94530de6f4138990c69ee2403729f81cf01ccfe160_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/metrics-collector-rhel9@sha256:f54082f3d2cc8795868a748ef1facafe7e686fbdd7d9d26ce4742e7b3e88166f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:f54082f3d2cc8795868a748ef1facafe7e686fbdd7d9d26ce4742e7b3e88166f_arm64"
},
"product_reference": "rhacm2/metrics-collector-rhel9@sha256:f54082f3d2cc8795868a748ef1facafe7e686fbdd7d9d26ce4742e7b3e88166f_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicloud-integrations-rhel9@sha256:2decfd9ef35f313c9523b8aa9cacbe3591ac664a6b33f67cd4675c7efb4ebfee_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:2decfd9ef35f313c9523b8aa9cacbe3591ac664a6b33f67cd4675c7efb4ebfee_amd64"
},
"product_reference": "rhacm2/multicloud-integrations-rhel9@sha256:2decfd9ef35f313c9523b8aa9cacbe3591ac664a6b33f67cd4675c7efb4ebfee_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicloud-integrations-rhel9@sha256:61a0a0c74d9120cd51664e4935415d8b927f13f1367d6e42dcc58583156e3549_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:61a0a0c74d9120cd51664e4935415d8b927f13f1367d6e42dcc58583156e3549_arm64"
},
"product_reference": "rhacm2/multicloud-integrations-rhel9@sha256:61a0a0c74d9120cd51664e4935415d8b927f13f1367d6e42dcc58583156e3549_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicloud-integrations-rhel9@sha256:aa99db54c55d6e4de3b6b38edb07f663c20330879bddd7e01fe07c09cc089692_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:aa99db54c55d6e4de3b6b38edb07f663c20330879bddd7e01fe07c09cc089692_s390x"
},
"product_reference": "rhacm2/multicloud-integrations-rhel9@sha256:aa99db54c55d6e4de3b6b38edb07f663c20330879bddd7e01fe07c09cc089692_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicloud-integrations-rhel9@sha256:ea34a34b26744875a6405d295aba7f3b3eefe95a82c9f313b086fcc37e6f7758_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:ea34a34b26744875a6405d295aba7f3b3eefe95a82c9f313b086fcc37e6f7758_ppc64le"
},
"product_reference": "rhacm2/multicloud-integrations-rhel9@sha256:ea34a34b26744875a6405d295aba7f3b3eefe95a82c9f313b086fcc37e6f7758_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:159af992ad940236d2e12e5a9a96b6268d3dd0fb2e3d50298590714a3cc2ca64_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:159af992ad940236d2e12e5a9a96b6268d3dd0fb2e3d50298590714a3cc2ca64_arm64"
},
"product_reference": "rhacm2/multicluster-observability-rhel9-operator@sha256:159af992ad940236d2e12e5a9a96b6268d3dd0fb2e3d50298590714a3cc2ca64_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:1ed41a512e64e2aaac90ce931838b24c0e87b2b00c22391f136927f21d1668c6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1ed41a512e64e2aaac90ce931838b24c0e87b2b00c22391f136927f21d1668c6_ppc64le"
},
"product_reference": "rhacm2/multicluster-observability-rhel9-operator@sha256:1ed41a512e64e2aaac90ce931838b24c0e87b2b00c22391f136927f21d1668c6_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:76be608f697d601af69e1cd1eb329988f6dc11d7f791dc87ffee93c9b4e19462_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:76be608f697d601af69e1cd1eb329988f6dc11d7f791dc87ffee93c9b4e19462_amd64"
},
"product_reference": "rhacm2/multicluster-observability-rhel9-operator@sha256:76be608f697d601af69e1cd1eb329988f6dc11d7f791dc87ffee93c9b4e19462_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-observability-rhel9-operator@sha256:e65963ff0b8c4a67d29a814902b468a59a52721678d1a134f6ea5f50c8f209ce_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:e65963ff0b8c4a67d29a814902b468a59a52721678d1a134f6ea5f50c8f209ce_s390x"
},
"product_reference": "rhacm2/multicluster-observability-rhel9-operator@sha256:e65963ff0b8c4a67d29a814902b468a59a52721678d1a134f6ea5f50c8f209ce_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:13b47046e478c78322a7b1c1eedb139a6d20f7a12eba76744447808451365d4f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:13b47046e478c78322a7b1c1eedb139a6d20f7a12eba76744447808451365d4f_amd64"
},
"product_reference": "rhacm2/multicluster-operators-application-rhel9@sha256:13b47046e478c78322a7b1c1eedb139a6d20f7a12eba76744447808451365d4f_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:39a0489f4931228b4869e02b92c287aa55975c1fee03494efb65b6b7924dfbfa_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:39a0489f4931228b4869e02b92c287aa55975c1fee03494efb65b6b7924dfbfa_arm64"
},
"product_reference": "rhacm2/multicluster-operators-application-rhel9@sha256:39a0489f4931228b4869e02b92c287aa55975c1fee03494efb65b6b7924dfbfa_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:5a61cd0e97b00f1ce157f52e40d08b42d70c8a8ba3ecee3d3ba1ac3b980c957d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:5a61cd0e97b00f1ce157f52e40d08b42d70c8a8ba3ecee3d3ba1ac3b980c957d_s390x"
},
"product_reference": "rhacm2/multicluster-operators-application-rhel9@sha256:5a61cd0e97b00f1ce157f52e40d08b42d70c8a8ba3ecee3d3ba1ac3b980c957d_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-application-rhel9@sha256:7e88fe2019f0384dfcebdd7a614313783d389ec4e177958c4239892310ec7347_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:7e88fe2019f0384dfcebdd7a614313783d389ec4e177958c4239892310ec7347_ppc64le"
},
"product_reference": "rhacm2/multicluster-operators-application-rhel9@sha256:7e88fe2019f0384dfcebdd7a614313783d389ec4e177958c4239892310ec7347_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:1971dadcae8f4cd6f83182ace52b4dd5fa140a4793e8068262d256366c5f49e9_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:1971dadcae8f4cd6f83182ace52b4dd5fa140a4793e8068262d256366c5f49e9_arm64"
},
"product_reference": "rhacm2/multicluster-operators-channel-rhel9@sha256:1971dadcae8f4cd6f83182ace52b4dd5fa140a4793e8068262d256366c5f49e9_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:a62f63e44bdc7e260674bd97c831866ac06b0a5706a6214fe9e176d78e2acdcd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:a62f63e44bdc7e260674bd97c831866ac06b0a5706a6214fe9e176d78e2acdcd_s390x"
},
"product_reference": "rhacm2/multicluster-operators-channel-rhel9@sha256:a62f63e44bdc7e260674bd97c831866ac06b0a5706a6214fe9e176d78e2acdcd_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:c3cb4dad342e8093ecf9c6f2c2ef21ab3730da65a6faa53fa96661b30205b379_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:c3cb4dad342e8093ecf9c6f2c2ef21ab3730da65a6faa53fa96661b30205b379_ppc64le"
},
"product_reference": "rhacm2/multicluster-operators-channel-rhel9@sha256:c3cb4dad342e8093ecf9c6f2c2ef21ab3730da65a6faa53fa96661b30205b379_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-channel-rhel9@sha256:d918349890b6f5e6d3fbcc4aaadfc85a68dfa826413e1f17b9f44ebbffa237be_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:d918349890b6f5e6d3fbcc4aaadfc85a68dfa826413e1f17b9f44ebbffa237be_amd64"
},
"product_reference": "rhacm2/multicluster-operators-channel-rhel9@sha256:d918349890b6f5e6d3fbcc4aaadfc85a68dfa826413e1f17b9f44ebbffa237be_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:0752b4c34ad37099cce9f2eb7353d20c856e55d6c2d061aa6ec2bb30d233c7f8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:0752b4c34ad37099cce9f2eb7353d20c856e55d6c2d061aa6ec2bb30d233c7f8_amd64"
},
"product_reference": "rhacm2/multicluster-operators-subscription-rhel9@sha256:0752b4c34ad37099cce9f2eb7353d20c856e55d6c2d061aa6ec2bb30d233c7f8_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:35396b89fef7697a90638cff6b3d3f470b50efd1e338231082d9981b078352c0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:35396b89fef7697a90638cff6b3d3f470b50efd1e338231082d9981b078352c0_s390x"
},
"product_reference": "rhacm2/multicluster-operators-subscription-rhel9@sha256:35396b89fef7697a90638cff6b3d3f470b50efd1e338231082d9981b078352c0_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:719ae5bcb99c622ce8d425c75058493c9f7831565906c86da3f07bc620423624_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:719ae5bcb99c622ce8d425c75058493c9f7831565906c86da3f07bc620423624_arm64"
},
"product_reference": "rhacm2/multicluster-operators-subscription-rhel9@sha256:719ae5bcb99c622ce8d425c75058493c9f7831565906c86da3f07bc620423624_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:fc3851a9143f8d5ed09282f7693b19a1f3d0d4105b228a2b2ac5d76ee57a43ce_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fc3851a9143f8d5ed09282f7693b19a1f3d0d4105b228a2b2ac5d76ee57a43ce_ppc64le"
},
"product_reference": "rhacm2/multicluster-operators-subscription-rhel9@sha256:fc3851a9143f8d5ed09282f7693b19a1f3d0d4105b228a2b2ac5d76ee57a43ce_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multiclusterhub-rhel9@sha256:0460beb9aafd8252c3ae014ce22a3274aab5dadf30c567a0fa4cecc0ee82f3f0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0460beb9aafd8252c3ae014ce22a3274aab5dadf30c567a0fa4cecc0ee82f3f0_s390x"
},
"product_reference": "rhacm2/multiclusterhub-rhel9@sha256:0460beb9aafd8252c3ae014ce22a3274aab5dadf30c567a0fa4cecc0ee82f3f0_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multiclusterhub-rhel9@sha256:361bd96dc256ecea450f06296c50a1df82ebadbdbbadbb782d46005d27834f35_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:361bd96dc256ecea450f06296c50a1df82ebadbdbbadbb782d46005d27834f35_arm64"
},
"product_reference": "rhacm2/multiclusterhub-rhel9@sha256:361bd96dc256ecea450f06296c50a1df82ebadbdbbadbb782d46005d27834f35_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multiclusterhub-rhel9@sha256:be732aecdb7cfbb8b5e9fc7d9c0a35689f9b9893e5ff8669343df1325d67b8f3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:be732aecdb7cfbb8b5e9fc7d9c0a35689f9b9893e5ff8669343df1325d67b8f3_ppc64le"
},
"product_reference": "rhacm2/multiclusterhub-rhel9@sha256:be732aecdb7cfbb8b5e9fc7d9c0a35689f9b9893e5ff8669343df1325d67b8f3_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/multiclusterhub-rhel9@sha256:eed08f44cbe82ac113843463baa2888f9db9a19842fa7a341ff1b80ce2cb1b3f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:eed08f44cbe82ac113843463baa2888f9db9a19842fa7a341ff1b80ce2cb1b3f_amd64"
},
"product_reference": "rhacm2/multiclusterhub-rhel9@sha256:eed08f44cbe82ac113843463baa2888f9db9a19842fa7a341ff1b80ce2cb1b3f_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/node-exporter-rhel9@sha256:9801dc0236da72bf3bd06324a6519549c5c12b3679027f241056139f39e3769e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:9801dc0236da72bf3bd06324a6519549c5c12b3679027f241056139f39e3769e_ppc64le"
},
"product_reference": "rhacm2/node-exporter-rhel9@sha256:9801dc0236da72bf3bd06324a6519549c5c12b3679027f241056139f39e3769e_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/node-exporter-rhel9@sha256:dc674aeba7abddfaae287c6b65b4915b97da4ee8b7f52c539d7532112e819332_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:dc674aeba7abddfaae287c6b65b4915b97da4ee8b7f52c539d7532112e819332_s390x"
},
"product_reference": "rhacm2/node-exporter-rhel9@sha256:dc674aeba7abddfaae287c6b65b4915b97da4ee8b7f52c539d7532112e819332_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/node-exporter-rhel9@sha256:ec1b716e6dfaa7424c5f0237bf2bd03d782e28c8102c3a7c2f837024a281345a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ec1b716e6dfaa7424c5f0237bf2bd03d782e28c8102c3a7c2f837024a281345a_arm64"
},
"product_reference": "rhacm2/node-exporter-rhel9@sha256:ec1b716e6dfaa7424c5f0237bf2bd03d782e28c8102c3a7c2f837024a281345a_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/node-exporter-rhel9@sha256:f41d452fa84c8175f7492d8d365c272a4edeaa12394e9ba798b62cf636e9d6dd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:f41d452fa84c8175f7492d8d365c272a4edeaa12394e9ba798b62cf636e9d6dd_amd64"
},
"product_reference": "rhacm2/node-exporter-rhel9@sha256:f41d452fa84c8175f7492d8d365c272a4edeaa12394e9ba798b62cf636e9d6dd_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/observatorium-rhel9-operator@sha256:1504cc510f790e9f3afbfa227da171da370e96ccbc765f022af9f15d03d7d3eb_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:1504cc510f790e9f3afbfa227da171da370e96ccbc765f022af9f15d03d7d3eb_arm64"
},
"product_reference": "rhacm2/observatorium-rhel9-operator@sha256:1504cc510f790e9f3afbfa227da171da370e96ccbc765f022af9f15d03d7d3eb_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/observatorium-rhel9-operator@sha256:6db823deb952c5ea5a050592d8abc65a6baefd9c93818c5d476084f49e0fd9cc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:6db823deb952c5ea5a050592d8abc65a6baefd9c93818c5d476084f49e0fd9cc_amd64"
},
"product_reference": "rhacm2/observatorium-rhel9-operator@sha256:6db823deb952c5ea5a050592d8abc65a6baefd9c93818c5d476084f49e0fd9cc_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/observatorium-rhel9-operator@sha256:871aa0da83c95d09ccab54ba439714f882be4d3ddf5bac0dc976da8068092407_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:871aa0da83c95d09ccab54ba439714f882be4d3ddf5bac0dc976da8068092407_ppc64le"
},
"product_reference": "rhacm2/observatorium-rhel9-operator@sha256:871aa0da83c95d09ccab54ba439714f882be4d3ddf5bac0dc976da8068092407_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/observatorium-rhel9-operator@sha256:e3de9eca133476045f0a38062a68712214d6d7dd8dc0372ee2b03ca0b5c50e22_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:e3de9eca133476045f0a38062a68712214d6d7dd8dc0372ee2b03ca0b5c50e22_s390x"
},
"product_reference": "rhacm2/observatorium-rhel9-operator@sha256:e3de9eca133476045f0a38062a68712214d6d7dd8dc0372ee2b03ca0b5c50e22_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/observatorium-rhel9@sha256:1089c7d9f66fe3c5c53c88ce13a95ba1edf10f5f30a46bea312aa9b9de8a0219_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:1089c7d9f66fe3c5c53c88ce13a95ba1edf10f5f30a46bea312aa9b9de8a0219_ppc64le"
},
"product_reference": "rhacm2/observatorium-rhel9@sha256:1089c7d9f66fe3c5c53c88ce13a95ba1edf10f5f30a46bea312aa9b9de8a0219_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/observatorium-rhel9@sha256:1a5eee37d4e2d6501f6f41062ac77aa1058e7702122fb8a63a92cf49a84439ff_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:1a5eee37d4e2d6501f6f41062ac77aa1058e7702122fb8a63a92cf49a84439ff_arm64"
},
"product_reference": "rhacm2/observatorium-rhel9@sha256:1a5eee37d4e2d6501f6f41062ac77aa1058e7702122fb8a63a92cf49a84439ff_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/observatorium-rhel9@sha256:58ac571afa7a7e568f5c149981c7f0bd9ae1396f3cbb1c19e039859fc55ace4d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:58ac571afa7a7e568f5c149981c7f0bd9ae1396f3cbb1c19e039859fc55ace4d_s390x"
},
"product_reference": "rhacm2/observatorium-rhel9@sha256:58ac571afa7a7e568f5c149981c7f0bd9ae1396f3cbb1c19e039859fc55ace4d_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/observatorium-rhel9@sha256:c46292e8f38fd6917ff385a783788e9bc1837a89596d1834136bea8ea6d7beb1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:c46292e8f38fd6917ff385a783788e9bc1837a89596d1834136bea8ea6d7beb1_amd64"
},
"product_reference": "rhacm2/observatorium-rhel9@sha256:c46292e8f38fd6917ff385a783788e9bc1837a89596d1834136bea8ea6d7beb1_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:13601743ecb798b4e701bb5cdcdfcdc6f9bdca72a3a16dbeace7f01ed80677fc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:13601743ecb798b4e701bb5cdcdfcdc6f9bdca72a3a16dbeace7f01ed80677fc_amd64"
},
"product_reference": "rhacm2/prometheus-alertmanager-rhel9@sha256:13601743ecb798b4e701bb5cdcdfcdc6f9bdca72a3a16dbeace7f01ed80677fc_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:1e17eb5ce26bb721c31fbaccd86f84864d4a65f0123200e4e0c61acc3341c5a0_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:1e17eb5ce26bb721c31fbaccd86f84864d4a65f0123200e4e0c61acc3341c5a0_arm64"
},
"product_reference": "rhacm2/prometheus-alertmanager-rhel9@sha256:1e17eb5ce26bb721c31fbaccd86f84864d4a65f0123200e4e0c61acc3341c5a0_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:7b4c9723dffe4f80b35621e72d25a785490652e8183ea9041f10b2443f704a28_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:7b4c9723dffe4f80b35621e72d25a785490652e8183ea9041f10b2443f704a28_ppc64le"
},
"product_reference": "rhacm2/prometheus-alertmanager-rhel9@sha256:7b4c9723dffe4f80b35621e72d25a785490652e8183ea9041f10b2443f704a28_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/prometheus-alertmanager-rhel9@sha256:d87854fd2a2e3ec5fabab7b296136d04bbc9921ee9beb1c47066465bc67bc8b1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:d87854fd2a2e3ec5fabab7b296136d04bbc9921ee9beb1c47066465bc67bc8b1_s390x"
},
"product_reference": "rhacm2/prometheus-alertmanager-rhel9@sha256:d87854fd2a2e3ec5fabab7b296136d04bbc9921ee9beb1c47066465bc67bc8b1_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/prometheus-rhel9@sha256:0e4527ae6eb39847906895597252e5309c5c8a7517ab63abffb199bfee278800_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:0e4527ae6eb39847906895597252e5309c5c8a7517ab63abffb199bfee278800_s390x"
},
"product_reference": "rhacm2/prometheus-rhel9@sha256:0e4527ae6eb39847906895597252e5309c5c8a7517ab63abffb199bfee278800_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/prometheus-rhel9@sha256:537ea377cb0b5ea51cc9aa40ee782b1fc62a77271d85f237712e30d57c1598b9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:537ea377cb0b5ea51cc9aa40ee782b1fc62a77271d85f237712e30d57c1598b9_amd64"
},
"product_reference": "rhacm2/prometheus-rhel9@sha256:537ea377cb0b5ea51cc9aa40ee782b1fc62a77271d85f237712e30d57c1598b9_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/prometheus-rhel9@sha256:883050f682c8dd39c59c5667bc9956bb8edc86925f00a967c72b652c15a6a995_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:883050f682c8dd39c59c5667bc9956bb8edc86925f00a967c72b652c15a6a995_arm64"
},
"product_reference": "rhacm2/prometheus-rhel9@sha256:883050f682c8dd39c59c5667bc9956bb8edc86925f00a967c72b652c15a6a995_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/prometheus-rhel9@sha256:9225b4eff0344b680a2551968991042af26ce1ee57f6e146db823a88fef17202_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:9225b4eff0344b680a2551968991042af26ce1ee57f6e146db823a88fef17202_ppc64le"
},
"product_reference": "rhacm2/prometheus-rhel9@sha256:9225b4eff0344b680a2551968991042af26ce1ee57f6e146db823a88fef17202_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:2e6e48e2a1eb9537ef1f309a79ad0b3356019b280f7bfcdcff266a95a7a476e7_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:2e6e48e2a1eb9537ef1f309a79ad0b3356019b280f7bfcdcff266a95a7a476e7_arm64"
},
"product_reference": "rhacm2/rbac-query-proxy-rhel9@sha256:2e6e48e2a1eb9537ef1f309a79ad0b3356019b280f7bfcdcff266a95a7a476e7_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:68301d721aa9238a26248f9d810251da1033746c492ad74a947c757fde8b0d82_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:68301d721aa9238a26248f9d810251da1033746c492ad74a947c757fde8b0d82_ppc64le"
},
"product_reference": "rhacm2/rbac-query-proxy-rhel9@sha256:68301d721aa9238a26248f9d810251da1033746c492ad74a947c757fde8b0d82_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:901a0b687f3f2b3285af83ad60aa70096f7d0167c0591c3344d4be147abd99b8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:901a0b687f3f2b3285af83ad60aa70096f7d0167c0591c3344d4be147abd99b8_s390x"
},
"product_reference": "rhacm2/rbac-query-proxy-rhel9@sha256:901a0b687f3f2b3285af83ad60aa70096f7d0167c0591c3344d4be147abd99b8_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/rbac-query-proxy-rhel9@sha256:a1f5ef8b49a5a5995d9e15029e3a66d10414b9177df428e9256ef3e32eb11e4b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:a1f5ef8b49a5a5995d9e15029e3a66d10414b9177df428e9256ef3e32eb11e4b_amd64"
},
"product_reference": "rhacm2/rbac-query-proxy-rhel9@sha256:a1f5ef8b49a5a5995d9e15029e3a66d10414b9177df428e9256ef3e32eb11e4b_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/search-collector-rhel9@sha256:0d48dabe4e58bf5ed1d4d94e0de0554ee6266b9b49adf6b84988faededa3cadd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:0d48dabe4e58bf5ed1d4d94e0de0554ee6266b9b49adf6b84988faededa3cadd_ppc64le"
},
"product_reference": "rhacm2/search-collector-rhel9@sha256:0d48dabe4e58bf5ed1d4d94e0de0554ee6266b9b49adf6b84988faededa3cadd_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/search-collector-rhel9@sha256:7eb732b83dae8125b9bff7b17c9cc5e3aea53994e2fa2e525d1fb31f7a3ec651_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:7eb732b83dae8125b9bff7b17c9cc5e3aea53994e2fa2e525d1fb31f7a3ec651_arm64"
},
"product_reference": "rhacm2/search-collector-rhel9@sha256:7eb732b83dae8125b9bff7b17c9cc5e3aea53994e2fa2e525d1fb31f7a3ec651_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/search-collector-rhel9@sha256:85e712c48e7b1fd0c9d638fefa490c7cdd75861a31fcf852270196419ece80b6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:85e712c48e7b1fd0c9d638fefa490c7cdd75861a31fcf852270196419ece80b6_s390x"
},
"product_reference": "rhacm2/search-collector-rhel9@sha256:85e712c48e7b1fd0c9d638fefa490c7cdd75861a31fcf852270196419ece80b6_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/search-collector-rhel9@sha256:c4adaaf67565d9a08f2a77335b012f9da5aac5dd97205cc0505d1c4248a97e5a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:c4adaaf67565d9a08f2a77335b012f9da5aac5dd97205cc0505d1c4248a97e5a_amd64"
},
"product_reference": "rhacm2/search-collector-rhel9@sha256:c4adaaf67565d9a08f2a77335b012f9da5aac5dd97205cc0505d1c4248a97e5a_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-addon-rhel9@sha256:4dea9f61c2a9b2eeff7976ebdcae99905d9b4519171d09967d7bf505b8614d71_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:4dea9f61c2a9b2eeff7976ebdcae99905d9b4519171d09967d7bf505b8614d71_arm64"
},
"product_reference": "rhacm2/submariner-addon-rhel9@sha256:4dea9f61c2a9b2eeff7976ebdcae99905d9b4519171d09967d7bf505b8614d71_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-addon-rhel9@sha256:82f953a4802785218310886026a0d84e7d91682960706e9bd07b8203888d604d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:82f953a4802785218310886026a0d84e7d91682960706e9bd07b8203888d604d_s390x"
},
"product_reference": "rhacm2/submariner-addon-rhel9@sha256:82f953a4802785218310886026a0d84e7d91682960706e9bd07b8203888d604d_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-addon-rhel9@sha256:aad95955f2e99469a2cf4f307bd2d72cf7645d7f0ad914c94f39dcb6c70fdb10_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:aad95955f2e99469a2cf4f307bd2d72cf7645d7f0ad914c94f39dcb6c70fdb10_amd64"
},
"product_reference": "rhacm2/submariner-addon-rhel9@sha256:aad95955f2e99469a2cf4f307bd2d72cf7645d7f0ad914c94f39dcb6c70fdb10_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/submariner-addon-rhel9@sha256:c6c6741e214007c9a4f46430fe1de4d7b1bce96aecff335e8155d324e6c58d9c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:c6c6741e214007c9a4f46430fe1de4d7b1bce96aecff335e8155d324e6c58d9c_ppc64le"
},
"product_reference": "rhacm2/submariner-addon-rhel9@sha256:c6c6741e214007c9a4f46430fe1de4d7b1bce96aecff335e8155d324e6c58d9c_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:2334f844c32c699c9e3cba1133f654efc0f839bc29ffa95dcbd1d00b4606f487_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:2334f844c32c699c9e3cba1133f654efc0f839bc29ffa95dcbd1d00b4606f487_arm64"
},
"product_reference": "rhacm2/thanos-receive-controller-rhel9@sha256:2334f844c32c699c9e3cba1133f654efc0f839bc29ffa95dcbd1d00b4606f487_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:437c5c3e4159707613430dce57c9f23de2d1d69fe38b0381afad1257310bf41f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:437c5c3e4159707613430dce57c9f23de2d1d69fe38b0381afad1257310bf41f_s390x"
},
"product_reference": "rhacm2/thanos-receive-controller-rhel9@sha256:437c5c3e4159707613430dce57c9f23de2d1d69fe38b0381afad1257310bf41f_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:6a01c917cec17e747de35f99b9e40ad90527f26ef6759cddde61688826fd8ee3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6a01c917cec17e747de35f99b9e40ad90527f26ef6759cddde61688826fd8ee3_amd64"
},
"product_reference": "rhacm2/thanos-receive-controller-rhel9@sha256:6a01c917cec17e747de35f99b9e40ad90527f26ef6759cddde61688826fd8ee3_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/thanos-receive-controller-rhel9@sha256:a4103d231dcaf4251faa183b9115d60654d7d0134d99601174fb564af5629139_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:a4103d231dcaf4251faa183b9115d60654d7d0134d99601174fb564af5629139_ppc64le"
},
"product_reference": "rhacm2/thanos-receive-controller-rhel9@sha256:a4103d231dcaf4251faa183b9115d60654d7d0134d99601174fb564af5629139_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/thanos-rhel9@sha256:09a4ff57bf934ad06aa25df65dbe0b2d49d02474d5558ebebbf4db88edbdbdc9_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:09a4ff57bf934ad06aa25df65dbe0b2d49d02474d5558ebebbf4db88edbdbdc9_arm64"
},
"product_reference": "rhacm2/thanos-rhel9@sha256:09a4ff57bf934ad06aa25df65dbe0b2d49d02474d5558ebebbf4db88edbdbdc9_arm64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/thanos-rhel9@sha256:1680e4ab31b03683da5ca81ed425aa24eb73377147086d0d89614f9b49aeb452_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1680e4ab31b03683da5ca81ed425aa24eb73377147086d0d89614f9b49aeb452_ppc64le"
},
"product_reference": "rhacm2/thanos-rhel9@sha256:1680e4ab31b03683da5ca81ed425aa24eb73377147086d0d89614f9b49aeb452_ppc64le",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/thanos-rhel9@sha256:34dc629403688e3e85edfad53942adbb0ccfd275537fb0a3b45633f7f4879115_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:34dc629403688e3e85edfad53942adbb0ccfd275537fb0a3b45633f7f4879115_amd64"
},
"product_reference": "rhacm2/thanos-rhel9@sha256:34dc629403688e3e85edfad53942adbb0ccfd275537fb0a3b45633f7f4879115_amd64",
"relates_to_product_reference": "9Base-RHACM-2.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhacm2/thanos-rhel9@sha256:f4edbbbc4760bb622c3b2c448689ca9c14385ddc67ce5e9c42ae1e7fc95af754_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9",
"product_id": "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:f4edbbbc4760bb622c3b2c448689ca9c14385ddc67ce5e9c42ae1e7fc95af754_s390x"
},
"product_reference": "rhacm2/thanos-rhel9@sha256:f4edbbbc4760bb622c3b2c448689ca9c14385ddc67ce5e9c42ae1e7fc95af754_s390x",
"relates_to_product_reference": "9Base-RHACM-2.11"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:1e1bd11fb0dc8023832e136c768f79e15e4512020684d79764cb67026a54c7fe_s390x",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:3366c160999585e8f4c2f752f9939fd3acf40d30d94113d2636e034aabb4df9d_amd64",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:46963b47975ca67020b9e775645d30cfcf71a1eb1262730a5b613eb11ab0b47b_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:b8cfd03917d420a22661ae336631f431d914cdb2d40988d5a1986613ff9e12fe_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:19e0efc68f3a4070f8e1fe42a57e8ebc752fcc46d381d86009245419b0c9623e_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:5d4e34144a88f91c88096202569cd92200e9a47fb76adb31e44ed0e48c20a9fe_s390x",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:a0f4ccde61fdd2a763d2c7fbb3f5ac5b2814260b386172c1540fec8ad98f55c9_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d0ab5b9c78a4e0edf6c631d5b19052b17e551dc6a5a522adf29c94ee24e2d0aa_amd64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:0cce3fe4592dea79eb43bb19810850135f077ca64d71a7ad3dbd5f147db2e790_amd64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:75e95cb72359a7fe830a1371b9ce6b09a944e62847037759b4aed0d3cd4be7d0_s390x",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:ab3d986a20ce852646911f5b388d3cb706257a054a065c6f8b75d9a03644aaab_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:d60a8a429f162cef2ab47752fe18acd72f5eade4b93a75702db9b9cc8da7d674_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:5f63690edba4da9bc0a8aebb05a5b13a0cd21853fa416474aa030af8608a0d6c_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:a5389c1f2e2cffbe9c3486f3515174c8dfb0a21e5d34756d7febaf366adc91d1_arm64",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:d2293b739ca6fcc5fe4663627f033d4a2b62e5f48bd9d0f3e9db7618305eecd5_amd64",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:fccbd02c7ff5f4b9b6db304fc92c9eb0627c18e725f2f1bc0cd7bbca3c721663_s390x",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:0bd298d6a49fc3a96be591912355d6ab966fa00d74068aef59222c6f147a3226_arm64",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:102aade20bd47f3e5e34dbbacb4a47a2862dd285a5247bc4b661102a24ff6854_amd64",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:4f18e4d08b07aefaed137ca815e4b87d8e7b9a9d9b36b015ef5b78e148c84834_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:b55d451073609d4a5ea9bccb48983bad29eae13b975135e9e64a24083e1e7aa9_s390x",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:01b2ffd6957b812fdcbe1a11980a7904c512461c7e39a3b3d6db254067122a83_s390x",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:0b7d0b1d3296963b1084887ced17ebb31d0c5e7eb612a2e2fe9c37f37f456ff0_amd64",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:57fbe046aa7bf06d38942e3ad3b3d0c6cb836b6111a5c8b6577c253cbdc45175_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5ea1c78750ee4c2e9fb17b3ea3433eafbb615616209dd6f4e7984e7f6095e2ee_arm64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:6f49205e572e2de9fb80cd4581d6d29ffd5c87dad007f410c9c2035984ea065d_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:902e1286a164470fdfea20e8ed19a1e8be2aac4ff8ace09df1101a61afa71a7a_s390x",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:ae2b8b404a744fe0ba5d5b3a2a294b06f4f420765f42e34a3207333c12360a07_amd64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:579b7f728cf4878e7e7cc804e59f575433db4e22a1ee5fb38142d20f1c51f15e_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a706778ba70694ba05bcdf705b64d7ab1887760a4f2b88f591d6b32f1108c7cf_amd64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:b120cb215382640a2656b9f8e4c4838cdf87dde769bee126f728cf7fd82f6dff_s390x",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:e0fc8a5f49eb7f510aa8a850cf56db7ef97d1de18e23d474eb9514bea5dada30_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:2113e6d7913d712792ff92c5c79d13a7bd54750b0891327f97cee18c380ac45c_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:26652d400f561ba913729bc99b1de27e7acdb6f2b768050cf9656f9daccf6cd9_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b7f960bffccc1a431f3094a730f773437648abdcddad489fef09f4c89eb88f8a_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:bcc7fb0186b3ee839752d6df30b1e8fb33a4f9e5cec463c53998b677a7666c35_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:037e5d2d019d97afd20a6a39961ebd0ca6c88e67ab5346be653cd46ac6f2489d_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:7d214a186e82d4fb534c18dd026b6eb577bcf83bbe3c47550d9d2e234218138f_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:eaeeca4d836f8c347aea55dd3c39f3761b492a05a8db43276b85cd60a4f2d709_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fd7033e1202e6a129cccac9e682c1b0ebbcdc577f0a1a62491af213b1a2754d7_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:4436bfd5acbf25128a0ffa97a6fe54db3917fc2e5843bac38fd415453077f527_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:832513a662fc4062b977857c548102efb1ddca6f1d77957dd2a9bdb8e21b92b2_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:b84c3be0f657bdcf774bb52a5a84d04da9f696786bcd78c73ed21397846db46d_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:e02cc7128940815e916578e0f9ba899b47961e659afa861de1c58bbd2d7f1381_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:b65b749a71b5fb4e88c766125ef5300ddbb1091de66317f2e36a7b6fd1c24dcd_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c9e0b72dbb4d189a4af8710e4eb1939c0bcbc0c64829d63999faf88ee01471c9_arm64",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:d3104d2297bdc2fe3f660c3c0a8b0220dd34b9adedd7b5ff0177984eb013a41d_s390x",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:ffa283d1841f5993c8a7efa17ecdbac722a16125c581309cc75e32167831bb81_amd64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:51ca0179fdfa587ead4e4c368713ad043969cc9157bb0e3fcf9421bfd1459f09_arm64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:b421b0785565d4bb573fae2ade2271d8985524981e67f8fa6be3dda042b8d8fd_amd64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:b4eed47f93eec2c1236fdd3fc00d3e7d5b71724acbd90f0d974ae5209226d0e5_ppc64le",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:f7fa4d19cc00a6858df774d335a9423623f1e5cff2429ca75f21876988333c0c_s390x",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:313cde7df3fd7048455e3d14574c3379c61fb4f09f08892d376ca4fe81b4ec88_arm64",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:969f519ff9b78ac6754857426b9b3fcd00a055e61bd9831e1ea5569f55ccb1ab_s390x",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f5f85025adc32a867f671ec774a2dcd40b0fce602ead3d38c6333e870c9a494d_amd64",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f86562dc7d33fbeb46aeca54e7ebab5c1419557de19e0c009212e9ffd17b8009_ppc64le",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:2fa53a7c9f4bb4c5b4ef237a3e33bfe56c5f7d8b9949fec6da90a0579ee5c1a5_arm64",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:3f6260c4873940c679a97365400e03eac234568e18e8cf82aaa6d413b42f3d9d_amd64",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:7e32333dc0744b6447f901d249a58c45e67d4328e5be45a9cb113e457ecda5db_s390x",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:a766c37590801c0bdfb09c6af7339f1c11f2f7305a40798697187d8bc2714546_ppc64le",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:68aed58064888b890b0771358eab07348814a5f6fdeb6e8b410e49cf2c690253_ppc64le",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:a7f07d46f4cda207815def9d9e1fe5bb45550ddcc026d4bfabd361265c77465b_s390x",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c58b30b96e0a63fa389cdf9c3dbc8d4518efd955d74bb39e0d19c58b67622995_amd64",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:dd15df86f85136d26e97301861bdba147dfacea08b8cf09dc56910bf1e687ae1_arm64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:7d128aba7603a33a67ef0f67f560c5afd929cd78e2d3bf24a5958cbcc8b70661_amd64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:7f982f2d6f649ecf2e97e9b6c7b86f4e8bbf7f2c8ba0bbd1656a84d2123764ac_arm64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:970bcea18b3222206505546f59dd33f0bb272995a001d4d2f46fa52d3c26fad1_s390x",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:fbdc67f341dfdd5e6b0b69ab9ae11fa9852bef0e49d2776abec698894716766e_ppc64le",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:5d390cda6fee76c914d1bf38ea367eda83e06421a8dc9d5c17db128e99ced452_ppc64le",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:a4ca90b6eaff84c204833b5487f8b57a8ac25745366e3d6ba2b1ba9555e0b4b9_arm64",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:ba2294c81af7e74a2f9757873f289c2bfa50cf1b90303ee849c36f3bbaf0a629_s390x",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:fbcad76f88280d74f8cc70a0a8f4eabc1b3562d814264c00c4aeace65ddd1685_amd64",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:07f3c4ff8a1066f0d96209a993a781c93c84cbaff45884a466c48cdb04f2ee0f_s390x",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5d41854e1cf846fb873df62ff19f8c6769a762e7ab10c59e31a7256fdc024141_ppc64le",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:7d73618e4322772f099856e6721913a74e49571c5193bbd6d70e0151deda85b5_amd64",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:9a1cd526bdf8206047baa7aa966efbdf3f68d349a193a37a7361af584c73a514_arm64",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:2c0368006980f837171e02f424046c43c64a18d64c952304cde5101651c1eef1_ppc64le",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:7e2c1db62bb662bd592bfc4f905d4d6fbe8bcc5ec7b204ed5fc821855dd04475_arm64",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:cd8046e4690fb132c8b4729a7cd903d22c342cc490c52452a511993d89eb8ce8_s390x",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:d5be048bb89baced719de180540409e23f0189405021fb14c738ee5497d379fe_amd64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:597a1c9f2313e7029813559f32b771ac9101d0dc3fa69e9bbe2074ad3749c9f8_arm64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:8a94a49a86e0ad8c316ca4ccfe22057c4de600a7a6348fde4cb9a074ced4b11d_amd64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:91f5e194946f1e722ad77cf239b9186000d4620a0539694231470f9e37ee7b9c_ppc64le",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:b2b6664a341979132fb48dfaccf5928d3364f67ae208c5bcc7e371b6daf76c02_s390x",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:1053810a6051c998474ffecb0edf869d0a9f7b5491a01b0901dc46b7e10d3471_amd64",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:1c292aa57a0df6b2454087b2c28ac8ceb15a4f38ba6167f89c065c96288dae22_arm64",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:68515253395e83121bdb0f46b34d20139be3f2f2857dc9bd5969808d93b19101_s390x",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:8dfd2e7838078b8cd16a79acef292f542c1b2f2ff658e8b8d8675975d4949c83_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1a774795c355aaf54aa68465df0dbc979038f71e4d758564dcfe6bbe68add37b_s390x",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:5866e1a7df1766e0eee840ee52e1ff6d72fd8f1ce9592d170b6dac87030bb1ba_amd64",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:7c8d19c50a8c067702866679ca5609fc7ef45781e6934ad30c9897d632f017f2_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:8db6efd9bd0c001f314840a04a3af39d90edcee2c1346595ba306a238f41400e_arm64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:17b158cd10422f13ebe511a2df7ccb19c057f60a04de029066a92fd05615c574_arm64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b44d391b46d3a6e8822075e9370aebaa50ba9114655e1dca1ebee30dc35bf166_amd64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:f85072dc26d07a83c243e735e1b80df866c3cfb860e48afcb10372e4e88b0c99_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:ff4787b74e906427ccc3e9d1485a55c6f3a0138a4f9fcc8dea3fea8abc25572f_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:4e799bc36694566e319c04b42dec3b9e707eec363aab6aa2e522f8c463d22545_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:5726663d8466d5c781da49251d0d3e37c882ffe0495f77c399847acfa65e34e6_ppc64le",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:9f2428b59ef34fc9b37ea96934e327a012d7b77db07bf84c6879bf7816d81b03_amd64",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:c0bafe5f26253a71e5c3e0599e8074945a64166384b285dc89bf1506b933dac5_arm64",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:4be2f7292d3128f185ac2ff4f19f5b6e8abbb052b1d48e372bd952af52ec5602_ppc64le",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:9b22e7673d2ec7de761191a6b2a08e93766ada717271f3c8321323777ac390d8_arm64",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d04a67c1b1605586ae6f3a25ea41b08ee8736960c22607b15b75d02a98f2b75a_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d1166a218d844b76009456e2e4e075e1bc464d5fd7fe2392b89b0f525fabcf44_amd64",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:a417273cebecbd6765ef8cfee76842faac2e9009e21c49edf08beb1e437d045e_ppc64le",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:cfb1610e0b3c2d09647d6257e94a8eee13520f6a5cdf015f9274be810193f757_s390x",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:e9cfc8f62328454027058c94530de6f4138990c69ee2403729f81cf01ccfe160_amd64",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:f54082f3d2cc8795868a748ef1facafe7e686fbdd7d9d26ce4742e7b3e88166f_arm64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:2decfd9ef35f313c9523b8aa9cacbe3591ac664a6b33f67cd4675c7efb4ebfee_amd64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:61a0a0c74d9120cd51664e4935415d8b927f13f1367d6e42dcc58583156e3549_arm64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:aa99db54c55d6e4de3b6b38edb07f663c20330879bddd7e01fe07c09cc089692_s390x",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:ea34a34b26744875a6405d295aba7f3b3eefe95a82c9f313b086fcc37e6f7758_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:159af992ad940236d2e12e5a9a96b6268d3dd0fb2e3d50298590714a3cc2ca64_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1ed41a512e64e2aaac90ce931838b24c0e87b2b00c22391f136927f21d1668c6_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:76be608f697d601af69e1cd1eb329988f6dc11d7f791dc87ffee93c9b4e19462_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:e65963ff0b8c4a67d29a814902b468a59a52721678d1a134f6ea5f50c8f209ce_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:13b47046e478c78322a7b1c1eedb139a6d20f7a12eba76744447808451365d4f_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:39a0489f4931228b4869e02b92c287aa55975c1fee03494efb65b6b7924dfbfa_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:5a61cd0e97b00f1ce157f52e40d08b42d70c8a8ba3ecee3d3ba1ac3b980c957d_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:7e88fe2019f0384dfcebdd7a614313783d389ec4e177958c4239892310ec7347_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:1971dadcae8f4cd6f83182ace52b4dd5fa140a4793e8068262d256366c5f49e9_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:a62f63e44bdc7e260674bd97c831866ac06b0a5706a6214fe9e176d78e2acdcd_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:c3cb4dad342e8093ecf9c6f2c2ef21ab3730da65a6faa53fa96661b30205b379_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:d918349890b6f5e6d3fbcc4aaadfc85a68dfa826413e1f17b9f44ebbffa237be_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:0752b4c34ad37099cce9f2eb7353d20c856e55d6c2d061aa6ec2bb30d233c7f8_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:35396b89fef7697a90638cff6b3d3f470b50efd1e338231082d9981b078352c0_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:719ae5bcb99c622ce8d425c75058493c9f7831565906c86da3f07bc620423624_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fc3851a9143f8d5ed09282f7693b19a1f3d0d4105b228a2b2ac5d76ee57a43ce_ppc64le",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0460beb9aafd8252c3ae014ce22a3274aab5dadf30c567a0fa4cecc0ee82f3f0_s390x",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:361bd96dc256ecea450f06296c50a1df82ebadbdbbadbb782d46005d27834f35_arm64",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:be732aecdb7cfbb8b5e9fc7d9c0a35689f9b9893e5ff8669343df1325d67b8f3_ppc64le",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:eed08f44cbe82ac113843463baa2888f9db9a19842fa7a341ff1b80ce2cb1b3f_amd64",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:9801dc0236da72bf3bd06324a6519549c5c12b3679027f241056139f39e3769e_ppc64le",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:dc674aeba7abddfaae287c6b65b4915b97da4ee8b7f52c539d7532112e819332_s390x",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ec1b716e6dfaa7424c5f0237bf2bd03d782e28c8102c3a7c2f837024a281345a_arm64",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:f41d452fa84c8175f7492d8d365c272a4edeaa12394e9ba798b62cf636e9d6dd_amd64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:1504cc510f790e9f3afbfa227da171da370e96ccbc765f022af9f15d03d7d3eb_arm64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:6db823deb952c5ea5a050592d8abc65a6baefd9c93818c5d476084f49e0fd9cc_amd64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:871aa0da83c95d09ccab54ba439714f882be4d3ddf5bac0dc976da8068092407_ppc64le",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:e3de9eca133476045f0a38062a68712214d6d7dd8dc0372ee2b03ca0b5c50e22_s390x",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:1089c7d9f66fe3c5c53c88ce13a95ba1edf10f5f30a46bea312aa9b9de8a0219_ppc64le",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:1a5eee37d4e2d6501f6f41062ac77aa1058e7702122fb8a63a92cf49a84439ff_arm64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:58ac571afa7a7e568f5c149981c7f0bd9ae1396f3cbb1c19e039859fc55ace4d_s390x",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:c46292e8f38fd6917ff385a783788e9bc1837a89596d1834136bea8ea6d7beb1_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:13601743ecb798b4e701bb5cdcdfcdc6f9bdca72a3a16dbeace7f01ed80677fc_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:1e17eb5ce26bb721c31fbaccd86f84864d4a65f0123200e4e0c61acc3341c5a0_arm64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:7b4c9723dffe4f80b35621e72d25a785490652e8183ea9041f10b2443f704a28_ppc64le",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:d87854fd2a2e3ec5fabab7b296136d04bbc9921ee9beb1c47066465bc67bc8b1_s390x",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:0e4527ae6eb39847906895597252e5309c5c8a7517ab63abffb199bfee278800_s390x",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:537ea377cb0b5ea51cc9aa40ee782b1fc62a77271d85f237712e30d57c1598b9_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:883050f682c8dd39c59c5667bc9956bb8edc86925f00a967c72b652c15a6a995_arm64",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:9225b4eff0344b680a2551968991042af26ce1ee57f6e146db823a88fef17202_ppc64le",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:2e6e48e2a1eb9537ef1f309a79ad0b3356019b280f7bfcdcff266a95a7a476e7_arm64",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:68301d721aa9238a26248f9d810251da1033746c492ad74a947c757fde8b0d82_ppc64le",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:901a0b687f3f2b3285af83ad60aa70096f7d0167c0591c3344d4be147abd99b8_s390x",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:a1f5ef8b49a5a5995d9e15029e3a66d10414b9177df428e9256ef3e32eb11e4b_amd64",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:0d48dabe4e58bf5ed1d4d94e0de0554ee6266b9b49adf6b84988faededa3cadd_ppc64le",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:7eb732b83dae8125b9bff7b17c9cc5e3aea53994e2fa2e525d1fb31f7a3ec651_arm64",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:85e712c48e7b1fd0c9d638fefa490c7cdd75861a31fcf852270196419ece80b6_s390x",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:c4adaaf67565d9a08f2a77335b012f9da5aac5dd97205cc0505d1c4248a97e5a_amd64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:4dea9f61c2a9b2eeff7976ebdcae99905d9b4519171d09967d7bf505b8614d71_arm64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:82f953a4802785218310886026a0d84e7d91682960706e9bd07b8203888d604d_s390x",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:aad95955f2e99469a2cf4f307bd2d72cf7645d7f0ad914c94f39dcb6c70fdb10_amd64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:c6c6741e214007c9a4f46430fe1de4d7b1bce96aecff335e8155d324e6c58d9c_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:2334f844c32c699c9e3cba1133f654efc0f839bc29ffa95dcbd1d00b4606f487_arm64",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:437c5c3e4159707613430dce57c9f23de2d1d69fe38b0381afad1257310bf41f_s390x",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6a01c917cec17e747de35f99b9e40ad90527f26ef6759cddde61688826fd8ee3_amd64",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:a4103d231dcaf4251faa183b9115d60654d7d0134d99601174fb564af5629139_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:09a4ff57bf934ad06aa25df65dbe0b2d49d02474d5558ebebbf4db88edbdbdc9_arm64",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1680e4ab31b03683da5ca81ed425aa24eb73377147086d0d89614f9b49aeb452_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:34dc629403688e3e85edfad53942adbb0ccfd275537fb0a3b45633f7f4879115_amd64",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:f4edbbbc4760bb622c3b2c448689ca9c14385ddc67ce5e9c42ae1e7fc95af754_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-29T16:23:10+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:1e1bd11fb0dc8023832e136c768f79e15e4512020684d79764cb67026a54c7fe_s390x",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:3366c160999585e8f4c2f752f9939fd3acf40d30d94113d2636e034aabb4df9d_amd64",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:46963b47975ca67020b9e775645d30cfcf71a1eb1262730a5b613eb11ab0b47b_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:b8cfd03917d420a22661ae336631f431d914cdb2d40988d5a1986613ff9e12fe_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:19e0efc68f3a4070f8e1fe42a57e8ebc752fcc46d381d86009245419b0c9623e_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:5d4e34144a88f91c88096202569cd92200e9a47fb76adb31e44ed0e48c20a9fe_s390x",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:a0f4ccde61fdd2a763d2c7fbb3f5ac5b2814260b386172c1540fec8ad98f55c9_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d0ab5b9c78a4e0edf6c631d5b19052b17e551dc6a5a522adf29c94ee24e2d0aa_amd64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:0cce3fe4592dea79eb43bb19810850135f077ca64d71a7ad3dbd5f147db2e790_amd64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:75e95cb72359a7fe830a1371b9ce6b09a944e62847037759b4aed0d3cd4be7d0_s390x",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:ab3d986a20ce852646911f5b388d3cb706257a054a065c6f8b75d9a03644aaab_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:d60a8a429f162cef2ab47752fe18acd72f5eade4b93a75702db9b9cc8da7d674_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:5f63690edba4da9bc0a8aebb05a5b13a0cd21853fa416474aa030af8608a0d6c_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:a5389c1f2e2cffbe9c3486f3515174c8dfb0a21e5d34756d7febaf366adc91d1_arm64",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:d2293b739ca6fcc5fe4663627f033d4a2b62e5f48bd9d0f3e9db7618305eecd5_amd64",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:fccbd02c7ff5f4b9b6db304fc92c9eb0627c18e725f2f1bc0cd7bbca3c721663_s390x",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:0bd298d6a49fc3a96be591912355d6ab966fa00d74068aef59222c6f147a3226_arm64",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:102aade20bd47f3e5e34dbbacb4a47a2862dd285a5247bc4b661102a24ff6854_amd64",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:4f18e4d08b07aefaed137ca815e4b87d8e7b9a9d9b36b015ef5b78e148c84834_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:b55d451073609d4a5ea9bccb48983bad29eae13b975135e9e64a24083e1e7aa9_s390x",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:01b2ffd6957b812fdcbe1a11980a7904c512461c7e39a3b3d6db254067122a83_s390x",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:0b7d0b1d3296963b1084887ced17ebb31d0c5e7eb612a2e2fe9c37f37f456ff0_amd64",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:57fbe046aa7bf06d38942e3ad3b3d0c6cb836b6111a5c8b6577c253cbdc45175_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5ea1c78750ee4c2e9fb17b3ea3433eafbb615616209dd6f4e7984e7f6095e2ee_arm64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:6f49205e572e2de9fb80cd4581d6d29ffd5c87dad007f410c9c2035984ea065d_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:902e1286a164470fdfea20e8ed19a1e8be2aac4ff8ace09df1101a61afa71a7a_s390x",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:ae2b8b404a744fe0ba5d5b3a2a294b06f4f420765f42e34a3207333c12360a07_amd64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:579b7f728cf4878e7e7cc804e59f575433db4e22a1ee5fb38142d20f1c51f15e_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a706778ba70694ba05bcdf705b64d7ab1887760a4f2b88f591d6b32f1108c7cf_amd64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:b120cb215382640a2656b9f8e4c4838cdf87dde769bee126f728cf7fd82f6dff_s390x",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:e0fc8a5f49eb7f510aa8a850cf56db7ef97d1de18e23d474eb9514bea5dada30_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:2113e6d7913d712792ff92c5c79d13a7bd54750b0891327f97cee18c380ac45c_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:26652d400f561ba913729bc99b1de27e7acdb6f2b768050cf9656f9daccf6cd9_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b7f960bffccc1a431f3094a730f773437648abdcddad489fef09f4c89eb88f8a_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:bcc7fb0186b3ee839752d6df30b1e8fb33a4f9e5cec463c53998b677a7666c35_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:037e5d2d019d97afd20a6a39961ebd0ca6c88e67ab5346be653cd46ac6f2489d_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:7d214a186e82d4fb534c18dd026b6eb577bcf83bbe3c47550d9d2e234218138f_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:eaeeca4d836f8c347aea55dd3c39f3761b492a05a8db43276b85cd60a4f2d709_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fd7033e1202e6a129cccac9e682c1b0ebbcdc577f0a1a62491af213b1a2754d7_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:4436bfd5acbf25128a0ffa97a6fe54db3917fc2e5843bac38fd415453077f527_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:832513a662fc4062b977857c548102efb1ddca6f1d77957dd2a9bdb8e21b92b2_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:b84c3be0f657bdcf774bb52a5a84d04da9f696786bcd78c73ed21397846db46d_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:e02cc7128940815e916578e0f9ba899b47961e659afa861de1c58bbd2d7f1381_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:b65b749a71b5fb4e88c766125ef5300ddbb1091de66317f2e36a7b6fd1c24dcd_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c9e0b72dbb4d189a4af8710e4eb1939c0bcbc0c64829d63999faf88ee01471c9_arm64",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:d3104d2297bdc2fe3f660c3c0a8b0220dd34b9adedd7b5ff0177984eb013a41d_s390x",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:ffa283d1841f5993c8a7efa17ecdbac722a16125c581309cc75e32167831bb81_amd64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:51ca0179fdfa587ead4e4c368713ad043969cc9157bb0e3fcf9421bfd1459f09_arm64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:b421b0785565d4bb573fae2ade2271d8985524981e67f8fa6be3dda042b8d8fd_amd64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:b4eed47f93eec2c1236fdd3fc00d3e7d5b71724acbd90f0d974ae5209226d0e5_ppc64le",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:f7fa4d19cc00a6858df774d335a9423623f1e5cff2429ca75f21876988333c0c_s390x",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:313cde7df3fd7048455e3d14574c3379c61fb4f09f08892d376ca4fe81b4ec88_arm64",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:969f519ff9b78ac6754857426b9b3fcd00a055e61bd9831e1ea5569f55ccb1ab_s390x",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f5f85025adc32a867f671ec774a2dcd40b0fce602ead3d38c6333e870c9a494d_amd64",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f86562dc7d33fbeb46aeca54e7ebab5c1419557de19e0c009212e9ffd17b8009_ppc64le",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:2fa53a7c9f4bb4c5b4ef237a3e33bfe56c5f7d8b9949fec6da90a0579ee5c1a5_arm64",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:3f6260c4873940c679a97365400e03eac234568e18e8cf82aaa6d413b42f3d9d_amd64",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:7e32333dc0744b6447f901d249a58c45e67d4328e5be45a9cb113e457ecda5db_s390x",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:a766c37590801c0bdfb09c6af7339f1c11f2f7305a40798697187d8bc2714546_ppc64le",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:68aed58064888b890b0771358eab07348814a5f6fdeb6e8b410e49cf2c690253_ppc64le",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:a7f07d46f4cda207815def9d9e1fe5bb45550ddcc026d4bfabd361265c77465b_s390x",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c58b30b96e0a63fa389cdf9c3dbc8d4518efd955d74bb39e0d19c58b67622995_amd64",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:dd15df86f85136d26e97301861bdba147dfacea08b8cf09dc56910bf1e687ae1_arm64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:7d128aba7603a33a67ef0f67f560c5afd929cd78e2d3bf24a5958cbcc8b70661_amd64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:7f982f2d6f649ecf2e97e9b6c7b86f4e8bbf7f2c8ba0bbd1656a84d2123764ac_arm64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:970bcea18b3222206505546f59dd33f0bb272995a001d4d2f46fa52d3c26fad1_s390x",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:fbdc67f341dfdd5e6b0b69ab9ae11fa9852bef0e49d2776abec698894716766e_ppc64le",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:5d390cda6fee76c914d1bf38ea367eda83e06421a8dc9d5c17db128e99ced452_ppc64le",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:a4ca90b6eaff84c204833b5487f8b57a8ac25745366e3d6ba2b1ba9555e0b4b9_arm64",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:ba2294c81af7e74a2f9757873f289c2bfa50cf1b90303ee849c36f3bbaf0a629_s390x",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:fbcad76f88280d74f8cc70a0a8f4eabc1b3562d814264c00c4aeace65ddd1685_amd64",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:07f3c4ff8a1066f0d96209a993a781c93c84cbaff45884a466c48cdb04f2ee0f_s390x",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5d41854e1cf846fb873df62ff19f8c6769a762e7ab10c59e31a7256fdc024141_ppc64le",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:7d73618e4322772f099856e6721913a74e49571c5193bbd6d70e0151deda85b5_amd64",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:9a1cd526bdf8206047baa7aa966efbdf3f68d349a193a37a7361af584c73a514_arm64",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:2c0368006980f837171e02f424046c43c64a18d64c952304cde5101651c1eef1_ppc64le",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:7e2c1db62bb662bd592bfc4f905d4d6fbe8bcc5ec7b204ed5fc821855dd04475_arm64",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:cd8046e4690fb132c8b4729a7cd903d22c342cc490c52452a511993d89eb8ce8_s390x",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:d5be048bb89baced719de180540409e23f0189405021fb14c738ee5497d379fe_amd64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:597a1c9f2313e7029813559f32b771ac9101d0dc3fa69e9bbe2074ad3749c9f8_arm64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:8a94a49a86e0ad8c316ca4ccfe22057c4de600a7a6348fde4cb9a074ced4b11d_amd64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:91f5e194946f1e722ad77cf239b9186000d4620a0539694231470f9e37ee7b9c_ppc64le",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:b2b6664a341979132fb48dfaccf5928d3364f67ae208c5bcc7e371b6daf76c02_s390x",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:1053810a6051c998474ffecb0edf869d0a9f7b5491a01b0901dc46b7e10d3471_amd64",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:1c292aa57a0df6b2454087b2c28ac8ceb15a4f38ba6167f89c065c96288dae22_arm64",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:68515253395e83121bdb0f46b34d20139be3f2f2857dc9bd5969808d93b19101_s390x",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:8dfd2e7838078b8cd16a79acef292f542c1b2f2ff658e8b8d8675975d4949c83_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1a774795c355aaf54aa68465df0dbc979038f71e4d758564dcfe6bbe68add37b_s390x",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:5866e1a7df1766e0eee840ee52e1ff6d72fd8f1ce9592d170b6dac87030bb1ba_amd64",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:7c8d19c50a8c067702866679ca5609fc7ef45781e6934ad30c9897d632f017f2_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:8db6efd9bd0c001f314840a04a3af39d90edcee2c1346595ba306a238f41400e_arm64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:17b158cd10422f13ebe511a2df7ccb19c057f60a04de029066a92fd05615c574_arm64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b44d391b46d3a6e8822075e9370aebaa50ba9114655e1dca1ebee30dc35bf166_amd64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:f85072dc26d07a83c243e735e1b80df866c3cfb860e48afcb10372e4e88b0c99_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:ff4787b74e906427ccc3e9d1485a55c6f3a0138a4f9fcc8dea3fea8abc25572f_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:4e799bc36694566e319c04b42dec3b9e707eec363aab6aa2e522f8c463d22545_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:5726663d8466d5c781da49251d0d3e37c882ffe0495f77c399847acfa65e34e6_ppc64le",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:9f2428b59ef34fc9b37ea96934e327a012d7b77db07bf84c6879bf7816d81b03_amd64",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:c0bafe5f26253a71e5c3e0599e8074945a64166384b285dc89bf1506b933dac5_arm64",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:4be2f7292d3128f185ac2ff4f19f5b6e8abbb052b1d48e372bd952af52ec5602_ppc64le",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:9b22e7673d2ec7de761191a6b2a08e93766ada717271f3c8321323777ac390d8_arm64",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d04a67c1b1605586ae6f3a25ea41b08ee8736960c22607b15b75d02a98f2b75a_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d1166a218d844b76009456e2e4e075e1bc464d5fd7fe2392b89b0f525fabcf44_amd64",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:a417273cebecbd6765ef8cfee76842faac2e9009e21c49edf08beb1e437d045e_ppc64le",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:cfb1610e0b3c2d09647d6257e94a8eee13520f6a5cdf015f9274be810193f757_s390x",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:e9cfc8f62328454027058c94530de6f4138990c69ee2403729f81cf01ccfe160_amd64",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:f54082f3d2cc8795868a748ef1facafe7e686fbdd7d9d26ce4742e7b3e88166f_arm64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:2decfd9ef35f313c9523b8aa9cacbe3591ac664a6b33f67cd4675c7efb4ebfee_amd64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:61a0a0c74d9120cd51664e4935415d8b927f13f1367d6e42dcc58583156e3549_arm64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:aa99db54c55d6e4de3b6b38edb07f663c20330879bddd7e01fe07c09cc089692_s390x",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:ea34a34b26744875a6405d295aba7f3b3eefe95a82c9f313b086fcc37e6f7758_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:159af992ad940236d2e12e5a9a96b6268d3dd0fb2e3d50298590714a3cc2ca64_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1ed41a512e64e2aaac90ce931838b24c0e87b2b00c22391f136927f21d1668c6_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:76be608f697d601af69e1cd1eb329988f6dc11d7f791dc87ffee93c9b4e19462_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:e65963ff0b8c4a67d29a814902b468a59a52721678d1a134f6ea5f50c8f209ce_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:13b47046e478c78322a7b1c1eedb139a6d20f7a12eba76744447808451365d4f_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:39a0489f4931228b4869e02b92c287aa55975c1fee03494efb65b6b7924dfbfa_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:5a61cd0e97b00f1ce157f52e40d08b42d70c8a8ba3ecee3d3ba1ac3b980c957d_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:7e88fe2019f0384dfcebdd7a614313783d389ec4e177958c4239892310ec7347_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:1971dadcae8f4cd6f83182ace52b4dd5fa140a4793e8068262d256366c5f49e9_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:a62f63e44bdc7e260674bd97c831866ac06b0a5706a6214fe9e176d78e2acdcd_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:c3cb4dad342e8093ecf9c6f2c2ef21ab3730da65a6faa53fa96661b30205b379_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:d918349890b6f5e6d3fbcc4aaadfc85a68dfa826413e1f17b9f44ebbffa237be_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:0752b4c34ad37099cce9f2eb7353d20c856e55d6c2d061aa6ec2bb30d233c7f8_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:35396b89fef7697a90638cff6b3d3f470b50efd1e338231082d9981b078352c0_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:719ae5bcb99c622ce8d425c75058493c9f7831565906c86da3f07bc620423624_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fc3851a9143f8d5ed09282f7693b19a1f3d0d4105b228a2b2ac5d76ee57a43ce_ppc64le",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0460beb9aafd8252c3ae014ce22a3274aab5dadf30c567a0fa4cecc0ee82f3f0_s390x",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:361bd96dc256ecea450f06296c50a1df82ebadbdbbadbb782d46005d27834f35_arm64",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:be732aecdb7cfbb8b5e9fc7d9c0a35689f9b9893e5ff8669343df1325d67b8f3_ppc64le",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:eed08f44cbe82ac113843463baa2888f9db9a19842fa7a341ff1b80ce2cb1b3f_amd64",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:9801dc0236da72bf3bd06324a6519549c5c12b3679027f241056139f39e3769e_ppc64le",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:dc674aeba7abddfaae287c6b65b4915b97da4ee8b7f52c539d7532112e819332_s390x",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ec1b716e6dfaa7424c5f0237bf2bd03d782e28c8102c3a7c2f837024a281345a_arm64",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:f41d452fa84c8175f7492d8d365c272a4edeaa12394e9ba798b62cf636e9d6dd_amd64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:1504cc510f790e9f3afbfa227da171da370e96ccbc765f022af9f15d03d7d3eb_arm64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:6db823deb952c5ea5a050592d8abc65a6baefd9c93818c5d476084f49e0fd9cc_amd64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:871aa0da83c95d09ccab54ba439714f882be4d3ddf5bac0dc976da8068092407_ppc64le",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:e3de9eca133476045f0a38062a68712214d6d7dd8dc0372ee2b03ca0b5c50e22_s390x",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:1089c7d9f66fe3c5c53c88ce13a95ba1edf10f5f30a46bea312aa9b9de8a0219_ppc64le",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:1a5eee37d4e2d6501f6f41062ac77aa1058e7702122fb8a63a92cf49a84439ff_arm64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:58ac571afa7a7e568f5c149981c7f0bd9ae1396f3cbb1c19e039859fc55ace4d_s390x",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:c46292e8f38fd6917ff385a783788e9bc1837a89596d1834136bea8ea6d7beb1_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:13601743ecb798b4e701bb5cdcdfcdc6f9bdca72a3a16dbeace7f01ed80677fc_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:1e17eb5ce26bb721c31fbaccd86f84864d4a65f0123200e4e0c61acc3341c5a0_arm64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:7b4c9723dffe4f80b35621e72d25a785490652e8183ea9041f10b2443f704a28_ppc64le",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:d87854fd2a2e3ec5fabab7b296136d04bbc9921ee9beb1c47066465bc67bc8b1_s390x",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:0e4527ae6eb39847906895597252e5309c5c8a7517ab63abffb199bfee278800_s390x",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:537ea377cb0b5ea51cc9aa40ee782b1fc62a77271d85f237712e30d57c1598b9_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:883050f682c8dd39c59c5667bc9956bb8edc86925f00a967c72b652c15a6a995_arm64",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:9225b4eff0344b680a2551968991042af26ce1ee57f6e146db823a88fef17202_ppc64le",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:2e6e48e2a1eb9537ef1f309a79ad0b3356019b280f7bfcdcff266a95a7a476e7_arm64",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:68301d721aa9238a26248f9d810251da1033746c492ad74a947c757fde8b0d82_ppc64le",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:901a0b687f3f2b3285af83ad60aa70096f7d0167c0591c3344d4be147abd99b8_s390x",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:a1f5ef8b49a5a5995d9e15029e3a66d10414b9177df428e9256ef3e32eb11e4b_amd64",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:0d48dabe4e58bf5ed1d4d94e0de0554ee6266b9b49adf6b84988faededa3cadd_ppc64le",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:7eb732b83dae8125b9bff7b17c9cc5e3aea53994e2fa2e525d1fb31f7a3ec651_arm64",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:85e712c48e7b1fd0c9d638fefa490c7cdd75861a31fcf852270196419ece80b6_s390x",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:c4adaaf67565d9a08f2a77335b012f9da5aac5dd97205cc0505d1c4248a97e5a_amd64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:4dea9f61c2a9b2eeff7976ebdcae99905d9b4519171d09967d7bf505b8614d71_arm64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:82f953a4802785218310886026a0d84e7d91682960706e9bd07b8203888d604d_s390x",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:aad95955f2e99469a2cf4f307bd2d72cf7645d7f0ad914c94f39dcb6c70fdb10_amd64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:c6c6741e214007c9a4f46430fe1de4d7b1bce96aecff335e8155d324e6c58d9c_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:2334f844c32c699c9e3cba1133f654efc0f839bc29ffa95dcbd1d00b4606f487_arm64",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:437c5c3e4159707613430dce57c9f23de2d1d69fe38b0381afad1257310bf41f_s390x",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6a01c917cec17e747de35f99b9e40ad90527f26ef6759cddde61688826fd8ee3_amd64",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:a4103d231dcaf4251faa183b9115d60654d7d0134d99601174fb564af5629139_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:09a4ff57bf934ad06aa25df65dbe0b2d49d02474d5558ebebbf4db88edbdbdc9_arm64",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1680e4ab31b03683da5ca81ed425aa24eb73377147086d0d89614f9b49aeb452_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:34dc629403688e3e85edfad53942adbb0ccfd275537fb0a3b45633f7f4879115_amd64",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:f4edbbbc4760bb622c3b2c448689ca9c14385ddc67ce5e9c42ae1e7fc95af754_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6044"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:1e1bd11fb0dc8023832e136c768f79e15e4512020684d79764cb67026a54c7fe_s390x",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:3366c160999585e8f4c2f752f9939fd3acf40d30d94113d2636e034aabb4df9d_amd64",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:46963b47975ca67020b9e775645d30cfcf71a1eb1262730a5b613eb11ab0b47b_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:b8cfd03917d420a22661ae336631f431d914cdb2d40988d5a1986613ff9e12fe_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:19e0efc68f3a4070f8e1fe42a57e8ebc752fcc46d381d86009245419b0c9623e_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:5d4e34144a88f91c88096202569cd92200e9a47fb76adb31e44ed0e48c20a9fe_s390x",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:a0f4ccde61fdd2a763d2c7fbb3f5ac5b2814260b386172c1540fec8ad98f55c9_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d0ab5b9c78a4e0edf6c631d5b19052b17e551dc6a5a522adf29c94ee24e2d0aa_amd64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:0cce3fe4592dea79eb43bb19810850135f077ca64d71a7ad3dbd5f147db2e790_amd64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:75e95cb72359a7fe830a1371b9ce6b09a944e62847037759b4aed0d3cd4be7d0_s390x",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:ab3d986a20ce852646911f5b388d3cb706257a054a065c6f8b75d9a03644aaab_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:d60a8a429f162cef2ab47752fe18acd72f5eade4b93a75702db9b9cc8da7d674_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:5f63690edba4da9bc0a8aebb05a5b13a0cd21853fa416474aa030af8608a0d6c_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:a5389c1f2e2cffbe9c3486f3515174c8dfb0a21e5d34756d7febaf366adc91d1_arm64",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:d2293b739ca6fcc5fe4663627f033d4a2b62e5f48bd9d0f3e9db7618305eecd5_amd64",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:fccbd02c7ff5f4b9b6db304fc92c9eb0627c18e725f2f1bc0cd7bbca3c721663_s390x",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:0bd298d6a49fc3a96be591912355d6ab966fa00d74068aef59222c6f147a3226_arm64",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:102aade20bd47f3e5e34dbbacb4a47a2862dd285a5247bc4b661102a24ff6854_amd64",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:4f18e4d08b07aefaed137ca815e4b87d8e7b9a9d9b36b015ef5b78e148c84834_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:b55d451073609d4a5ea9bccb48983bad29eae13b975135e9e64a24083e1e7aa9_s390x",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:01b2ffd6957b812fdcbe1a11980a7904c512461c7e39a3b3d6db254067122a83_s390x",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:0b7d0b1d3296963b1084887ced17ebb31d0c5e7eb612a2e2fe9c37f37f456ff0_amd64",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:57fbe046aa7bf06d38942e3ad3b3d0c6cb836b6111a5c8b6577c253cbdc45175_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5ea1c78750ee4c2e9fb17b3ea3433eafbb615616209dd6f4e7984e7f6095e2ee_arm64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:6f49205e572e2de9fb80cd4581d6d29ffd5c87dad007f410c9c2035984ea065d_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:902e1286a164470fdfea20e8ed19a1e8be2aac4ff8ace09df1101a61afa71a7a_s390x",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:ae2b8b404a744fe0ba5d5b3a2a294b06f4f420765f42e34a3207333c12360a07_amd64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:579b7f728cf4878e7e7cc804e59f575433db4e22a1ee5fb38142d20f1c51f15e_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a706778ba70694ba05bcdf705b64d7ab1887760a4f2b88f591d6b32f1108c7cf_amd64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:b120cb215382640a2656b9f8e4c4838cdf87dde769bee126f728cf7fd82f6dff_s390x",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:e0fc8a5f49eb7f510aa8a850cf56db7ef97d1de18e23d474eb9514bea5dada30_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:2113e6d7913d712792ff92c5c79d13a7bd54750b0891327f97cee18c380ac45c_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:26652d400f561ba913729bc99b1de27e7acdb6f2b768050cf9656f9daccf6cd9_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b7f960bffccc1a431f3094a730f773437648abdcddad489fef09f4c89eb88f8a_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:bcc7fb0186b3ee839752d6df30b1e8fb33a4f9e5cec463c53998b677a7666c35_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:037e5d2d019d97afd20a6a39961ebd0ca6c88e67ab5346be653cd46ac6f2489d_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:7d214a186e82d4fb534c18dd026b6eb577bcf83bbe3c47550d9d2e234218138f_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:eaeeca4d836f8c347aea55dd3c39f3761b492a05a8db43276b85cd60a4f2d709_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fd7033e1202e6a129cccac9e682c1b0ebbcdc577f0a1a62491af213b1a2754d7_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:4436bfd5acbf25128a0ffa97a6fe54db3917fc2e5843bac38fd415453077f527_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:832513a662fc4062b977857c548102efb1ddca6f1d77957dd2a9bdb8e21b92b2_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:b84c3be0f657bdcf774bb52a5a84d04da9f696786bcd78c73ed21397846db46d_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:e02cc7128940815e916578e0f9ba899b47961e659afa861de1c58bbd2d7f1381_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:b65b749a71b5fb4e88c766125ef5300ddbb1091de66317f2e36a7b6fd1c24dcd_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c9e0b72dbb4d189a4af8710e4eb1939c0bcbc0c64829d63999faf88ee01471c9_arm64",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:d3104d2297bdc2fe3f660c3c0a8b0220dd34b9adedd7b5ff0177984eb013a41d_s390x",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:ffa283d1841f5993c8a7efa17ecdbac722a16125c581309cc75e32167831bb81_amd64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:51ca0179fdfa587ead4e4c368713ad043969cc9157bb0e3fcf9421bfd1459f09_arm64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:b421b0785565d4bb573fae2ade2271d8985524981e67f8fa6be3dda042b8d8fd_amd64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:b4eed47f93eec2c1236fdd3fc00d3e7d5b71724acbd90f0d974ae5209226d0e5_ppc64le",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:f7fa4d19cc00a6858df774d335a9423623f1e5cff2429ca75f21876988333c0c_s390x",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:313cde7df3fd7048455e3d14574c3379c61fb4f09f08892d376ca4fe81b4ec88_arm64",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:969f519ff9b78ac6754857426b9b3fcd00a055e61bd9831e1ea5569f55ccb1ab_s390x",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f5f85025adc32a867f671ec774a2dcd40b0fce602ead3d38c6333e870c9a494d_amd64",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f86562dc7d33fbeb46aeca54e7ebab5c1419557de19e0c009212e9ffd17b8009_ppc64le",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:2fa53a7c9f4bb4c5b4ef237a3e33bfe56c5f7d8b9949fec6da90a0579ee5c1a5_arm64",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:3f6260c4873940c679a97365400e03eac234568e18e8cf82aaa6d413b42f3d9d_amd64",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:7e32333dc0744b6447f901d249a58c45e67d4328e5be45a9cb113e457ecda5db_s390x",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:a766c37590801c0bdfb09c6af7339f1c11f2f7305a40798697187d8bc2714546_ppc64le",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:68aed58064888b890b0771358eab07348814a5f6fdeb6e8b410e49cf2c690253_ppc64le",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:a7f07d46f4cda207815def9d9e1fe5bb45550ddcc026d4bfabd361265c77465b_s390x",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c58b30b96e0a63fa389cdf9c3dbc8d4518efd955d74bb39e0d19c58b67622995_amd64",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:dd15df86f85136d26e97301861bdba147dfacea08b8cf09dc56910bf1e687ae1_arm64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:7d128aba7603a33a67ef0f67f560c5afd929cd78e2d3bf24a5958cbcc8b70661_amd64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:7f982f2d6f649ecf2e97e9b6c7b86f4e8bbf7f2c8ba0bbd1656a84d2123764ac_arm64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:970bcea18b3222206505546f59dd33f0bb272995a001d4d2f46fa52d3c26fad1_s390x",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:fbdc67f341dfdd5e6b0b69ab9ae11fa9852bef0e49d2776abec698894716766e_ppc64le",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:5d390cda6fee76c914d1bf38ea367eda83e06421a8dc9d5c17db128e99ced452_ppc64le",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:a4ca90b6eaff84c204833b5487f8b57a8ac25745366e3d6ba2b1ba9555e0b4b9_arm64",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:ba2294c81af7e74a2f9757873f289c2bfa50cf1b90303ee849c36f3bbaf0a629_s390x",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:fbcad76f88280d74f8cc70a0a8f4eabc1b3562d814264c00c4aeace65ddd1685_amd64",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:07f3c4ff8a1066f0d96209a993a781c93c84cbaff45884a466c48cdb04f2ee0f_s390x",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5d41854e1cf846fb873df62ff19f8c6769a762e7ab10c59e31a7256fdc024141_ppc64le",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:7d73618e4322772f099856e6721913a74e49571c5193bbd6d70e0151deda85b5_amd64",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:9a1cd526bdf8206047baa7aa966efbdf3f68d349a193a37a7361af584c73a514_arm64",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:2c0368006980f837171e02f424046c43c64a18d64c952304cde5101651c1eef1_ppc64le",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:7e2c1db62bb662bd592bfc4f905d4d6fbe8bcc5ec7b204ed5fc821855dd04475_arm64",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:cd8046e4690fb132c8b4729a7cd903d22c342cc490c52452a511993d89eb8ce8_s390x",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:d5be048bb89baced719de180540409e23f0189405021fb14c738ee5497d379fe_amd64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:597a1c9f2313e7029813559f32b771ac9101d0dc3fa69e9bbe2074ad3749c9f8_arm64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:8a94a49a86e0ad8c316ca4ccfe22057c4de600a7a6348fde4cb9a074ced4b11d_amd64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:91f5e194946f1e722ad77cf239b9186000d4620a0539694231470f9e37ee7b9c_ppc64le",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:b2b6664a341979132fb48dfaccf5928d3364f67ae208c5bcc7e371b6daf76c02_s390x",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:1053810a6051c998474ffecb0edf869d0a9f7b5491a01b0901dc46b7e10d3471_amd64",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:1c292aa57a0df6b2454087b2c28ac8ceb15a4f38ba6167f89c065c96288dae22_arm64",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:68515253395e83121bdb0f46b34d20139be3f2f2857dc9bd5969808d93b19101_s390x",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:8dfd2e7838078b8cd16a79acef292f542c1b2f2ff658e8b8d8675975d4949c83_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1a774795c355aaf54aa68465df0dbc979038f71e4d758564dcfe6bbe68add37b_s390x",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:5866e1a7df1766e0eee840ee52e1ff6d72fd8f1ce9592d170b6dac87030bb1ba_amd64",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:7c8d19c50a8c067702866679ca5609fc7ef45781e6934ad30c9897d632f017f2_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:8db6efd9bd0c001f314840a04a3af39d90edcee2c1346595ba306a238f41400e_arm64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:17b158cd10422f13ebe511a2df7ccb19c057f60a04de029066a92fd05615c574_arm64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b44d391b46d3a6e8822075e9370aebaa50ba9114655e1dca1ebee30dc35bf166_amd64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:f85072dc26d07a83c243e735e1b80df866c3cfb860e48afcb10372e4e88b0c99_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:ff4787b74e906427ccc3e9d1485a55c6f3a0138a4f9fcc8dea3fea8abc25572f_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:4e799bc36694566e319c04b42dec3b9e707eec363aab6aa2e522f8c463d22545_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:5726663d8466d5c781da49251d0d3e37c882ffe0495f77c399847acfa65e34e6_ppc64le",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:9f2428b59ef34fc9b37ea96934e327a012d7b77db07bf84c6879bf7816d81b03_amd64",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:c0bafe5f26253a71e5c3e0599e8074945a64166384b285dc89bf1506b933dac5_arm64",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:4be2f7292d3128f185ac2ff4f19f5b6e8abbb052b1d48e372bd952af52ec5602_ppc64le",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:9b22e7673d2ec7de761191a6b2a08e93766ada717271f3c8321323777ac390d8_arm64",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d04a67c1b1605586ae6f3a25ea41b08ee8736960c22607b15b75d02a98f2b75a_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d1166a218d844b76009456e2e4e075e1bc464d5fd7fe2392b89b0f525fabcf44_amd64",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:a417273cebecbd6765ef8cfee76842faac2e9009e21c49edf08beb1e437d045e_ppc64le",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:cfb1610e0b3c2d09647d6257e94a8eee13520f6a5cdf015f9274be810193f757_s390x",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:e9cfc8f62328454027058c94530de6f4138990c69ee2403729f81cf01ccfe160_amd64",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:f54082f3d2cc8795868a748ef1facafe7e686fbdd7d9d26ce4742e7b3e88166f_arm64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:2decfd9ef35f313c9523b8aa9cacbe3591ac664a6b33f67cd4675c7efb4ebfee_amd64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:61a0a0c74d9120cd51664e4935415d8b927f13f1367d6e42dcc58583156e3549_arm64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:aa99db54c55d6e4de3b6b38edb07f663c20330879bddd7e01fe07c09cc089692_s390x",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:ea34a34b26744875a6405d295aba7f3b3eefe95a82c9f313b086fcc37e6f7758_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:159af992ad940236d2e12e5a9a96b6268d3dd0fb2e3d50298590714a3cc2ca64_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1ed41a512e64e2aaac90ce931838b24c0e87b2b00c22391f136927f21d1668c6_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:76be608f697d601af69e1cd1eb329988f6dc11d7f791dc87ffee93c9b4e19462_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:e65963ff0b8c4a67d29a814902b468a59a52721678d1a134f6ea5f50c8f209ce_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:13b47046e478c78322a7b1c1eedb139a6d20f7a12eba76744447808451365d4f_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:39a0489f4931228b4869e02b92c287aa55975c1fee03494efb65b6b7924dfbfa_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:5a61cd0e97b00f1ce157f52e40d08b42d70c8a8ba3ecee3d3ba1ac3b980c957d_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:7e88fe2019f0384dfcebdd7a614313783d389ec4e177958c4239892310ec7347_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:1971dadcae8f4cd6f83182ace52b4dd5fa140a4793e8068262d256366c5f49e9_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:a62f63e44bdc7e260674bd97c831866ac06b0a5706a6214fe9e176d78e2acdcd_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:c3cb4dad342e8093ecf9c6f2c2ef21ab3730da65a6faa53fa96661b30205b379_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:d918349890b6f5e6d3fbcc4aaadfc85a68dfa826413e1f17b9f44ebbffa237be_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:0752b4c34ad37099cce9f2eb7353d20c856e55d6c2d061aa6ec2bb30d233c7f8_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:35396b89fef7697a90638cff6b3d3f470b50efd1e338231082d9981b078352c0_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:719ae5bcb99c622ce8d425c75058493c9f7831565906c86da3f07bc620423624_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fc3851a9143f8d5ed09282f7693b19a1f3d0d4105b228a2b2ac5d76ee57a43ce_ppc64le",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0460beb9aafd8252c3ae014ce22a3274aab5dadf30c567a0fa4cecc0ee82f3f0_s390x",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:361bd96dc256ecea450f06296c50a1df82ebadbdbbadbb782d46005d27834f35_arm64",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:be732aecdb7cfbb8b5e9fc7d9c0a35689f9b9893e5ff8669343df1325d67b8f3_ppc64le",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:eed08f44cbe82ac113843463baa2888f9db9a19842fa7a341ff1b80ce2cb1b3f_amd64",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:9801dc0236da72bf3bd06324a6519549c5c12b3679027f241056139f39e3769e_ppc64le",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:dc674aeba7abddfaae287c6b65b4915b97da4ee8b7f52c539d7532112e819332_s390x",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ec1b716e6dfaa7424c5f0237bf2bd03d782e28c8102c3a7c2f837024a281345a_arm64",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:f41d452fa84c8175f7492d8d365c272a4edeaa12394e9ba798b62cf636e9d6dd_amd64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:1504cc510f790e9f3afbfa227da171da370e96ccbc765f022af9f15d03d7d3eb_arm64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:6db823deb952c5ea5a050592d8abc65a6baefd9c93818c5d476084f49e0fd9cc_amd64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:871aa0da83c95d09ccab54ba439714f882be4d3ddf5bac0dc976da8068092407_ppc64le",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:e3de9eca133476045f0a38062a68712214d6d7dd8dc0372ee2b03ca0b5c50e22_s390x",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:1089c7d9f66fe3c5c53c88ce13a95ba1edf10f5f30a46bea312aa9b9de8a0219_ppc64le",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:1a5eee37d4e2d6501f6f41062ac77aa1058e7702122fb8a63a92cf49a84439ff_arm64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:58ac571afa7a7e568f5c149981c7f0bd9ae1396f3cbb1c19e039859fc55ace4d_s390x",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:c46292e8f38fd6917ff385a783788e9bc1837a89596d1834136bea8ea6d7beb1_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:13601743ecb798b4e701bb5cdcdfcdc6f9bdca72a3a16dbeace7f01ed80677fc_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:1e17eb5ce26bb721c31fbaccd86f84864d4a65f0123200e4e0c61acc3341c5a0_arm64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:7b4c9723dffe4f80b35621e72d25a785490652e8183ea9041f10b2443f704a28_ppc64le",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:d87854fd2a2e3ec5fabab7b296136d04bbc9921ee9beb1c47066465bc67bc8b1_s390x",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:0e4527ae6eb39847906895597252e5309c5c8a7517ab63abffb199bfee278800_s390x",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:537ea377cb0b5ea51cc9aa40ee782b1fc62a77271d85f237712e30d57c1598b9_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:883050f682c8dd39c59c5667bc9956bb8edc86925f00a967c72b652c15a6a995_arm64",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:9225b4eff0344b680a2551968991042af26ce1ee57f6e146db823a88fef17202_ppc64le",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:2e6e48e2a1eb9537ef1f309a79ad0b3356019b280f7bfcdcff266a95a7a476e7_arm64",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:68301d721aa9238a26248f9d810251da1033746c492ad74a947c757fde8b0d82_ppc64le",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:901a0b687f3f2b3285af83ad60aa70096f7d0167c0591c3344d4be147abd99b8_s390x",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:a1f5ef8b49a5a5995d9e15029e3a66d10414b9177df428e9256ef3e32eb11e4b_amd64",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:0d48dabe4e58bf5ed1d4d94e0de0554ee6266b9b49adf6b84988faededa3cadd_ppc64le",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:7eb732b83dae8125b9bff7b17c9cc5e3aea53994e2fa2e525d1fb31f7a3ec651_arm64",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:85e712c48e7b1fd0c9d638fefa490c7cdd75861a31fcf852270196419ece80b6_s390x",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:c4adaaf67565d9a08f2a77335b012f9da5aac5dd97205cc0505d1c4248a97e5a_amd64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:4dea9f61c2a9b2eeff7976ebdcae99905d9b4519171d09967d7bf505b8614d71_arm64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:82f953a4802785218310886026a0d84e7d91682960706e9bd07b8203888d604d_s390x",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:aad95955f2e99469a2cf4f307bd2d72cf7645d7f0ad914c94f39dcb6c70fdb10_amd64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:c6c6741e214007c9a4f46430fe1de4d7b1bce96aecff335e8155d324e6c58d9c_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:2334f844c32c699c9e3cba1133f654efc0f839bc29ffa95dcbd1d00b4606f487_arm64",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:437c5c3e4159707613430dce57c9f23de2d1d69fe38b0381afad1257310bf41f_s390x",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6a01c917cec17e747de35f99b9e40ad90527f26ef6759cddde61688826fd8ee3_amd64",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:a4103d231dcaf4251faa183b9115d60654d7d0134d99601174fb564af5629139_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:09a4ff57bf934ad06aa25df65dbe0b2d49d02474d5558ebebbf4db88edbdbdc9_arm64",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1680e4ab31b03683da5ca81ed425aa24eb73377147086d0d89614f9b49aeb452_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:34dc629403688e3e85edfad53942adbb0ccfd275537fb0a3b45633f7f4879115_amd64",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:f4edbbbc4760bb622c3b2c448689ca9c14385ddc67ce5e9c42ae1e7fc95af754_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:1e1bd11fb0dc8023832e136c768f79e15e4512020684d79764cb67026a54c7fe_s390x",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:3366c160999585e8f4c2f752f9939fd3acf40d30d94113d2636e034aabb4df9d_amd64",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:46963b47975ca67020b9e775645d30cfcf71a1eb1262730a5b613eb11ab0b47b_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:b8cfd03917d420a22661ae336631f431d914cdb2d40988d5a1986613ff9e12fe_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:19e0efc68f3a4070f8e1fe42a57e8ebc752fcc46d381d86009245419b0c9623e_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:5d4e34144a88f91c88096202569cd92200e9a47fb76adb31e44ed0e48c20a9fe_s390x",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:a0f4ccde61fdd2a763d2c7fbb3f5ac5b2814260b386172c1540fec8ad98f55c9_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d0ab5b9c78a4e0edf6c631d5b19052b17e551dc6a5a522adf29c94ee24e2d0aa_amd64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:0cce3fe4592dea79eb43bb19810850135f077ca64d71a7ad3dbd5f147db2e790_amd64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:75e95cb72359a7fe830a1371b9ce6b09a944e62847037759b4aed0d3cd4be7d0_s390x",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:ab3d986a20ce852646911f5b388d3cb706257a054a065c6f8b75d9a03644aaab_arm64",
"9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:d60a8a429f162cef2ab47752fe18acd72f5eade4b93a75702db9b9cc8da7d674_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:5f63690edba4da9bc0a8aebb05a5b13a0cd21853fa416474aa030af8608a0d6c_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:a5389c1f2e2cffbe9c3486f3515174c8dfb0a21e5d34756d7febaf366adc91d1_arm64",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:d2293b739ca6fcc5fe4663627f033d4a2b62e5f48bd9d0f3e9db7618305eecd5_amd64",
"9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:fccbd02c7ff5f4b9b6db304fc92c9eb0627c18e725f2f1bc0cd7bbca3c721663_s390x",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:0bd298d6a49fc3a96be591912355d6ab966fa00d74068aef59222c6f147a3226_arm64",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:102aade20bd47f3e5e34dbbacb4a47a2862dd285a5247bc4b661102a24ff6854_amd64",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:4f18e4d08b07aefaed137ca815e4b87d8e7b9a9d9b36b015ef5b78e148c84834_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:b55d451073609d4a5ea9bccb48983bad29eae13b975135e9e64a24083e1e7aa9_s390x",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:01b2ffd6957b812fdcbe1a11980a7904c512461c7e39a3b3d6db254067122a83_s390x",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:0b7d0b1d3296963b1084887ced17ebb31d0c5e7eb612a2e2fe9c37f37f456ff0_amd64",
"9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:57fbe046aa7bf06d38942e3ad3b3d0c6cb836b6111a5c8b6577c253cbdc45175_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5ea1c78750ee4c2e9fb17b3ea3433eafbb615616209dd6f4e7984e7f6095e2ee_arm64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:6f49205e572e2de9fb80cd4581d6d29ffd5c87dad007f410c9c2035984ea065d_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:902e1286a164470fdfea20e8ed19a1e8be2aac4ff8ace09df1101a61afa71a7a_s390x",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:ae2b8b404a744fe0ba5d5b3a2a294b06f4f420765f42e34a3207333c12360a07_amd64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:579b7f728cf4878e7e7cc804e59f575433db4e22a1ee5fb38142d20f1c51f15e_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a706778ba70694ba05bcdf705b64d7ab1887760a4f2b88f591d6b32f1108c7cf_amd64",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:b120cb215382640a2656b9f8e4c4838cdf87dde769bee126f728cf7fd82f6dff_s390x",
"9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:e0fc8a5f49eb7f510aa8a850cf56db7ef97d1de18e23d474eb9514bea5dada30_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:2113e6d7913d712792ff92c5c79d13a7bd54750b0891327f97cee18c380ac45c_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:26652d400f561ba913729bc99b1de27e7acdb6f2b768050cf9656f9daccf6cd9_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b7f960bffccc1a431f3094a730f773437648abdcddad489fef09f4c89eb88f8a_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:bcc7fb0186b3ee839752d6df30b1e8fb33a4f9e5cec463c53998b677a7666c35_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:037e5d2d019d97afd20a6a39961ebd0ca6c88e67ab5346be653cd46ac6f2489d_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:7d214a186e82d4fb534c18dd026b6eb577bcf83bbe3c47550d9d2e234218138f_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:eaeeca4d836f8c347aea55dd3c39f3761b492a05a8db43276b85cd60a4f2d709_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fd7033e1202e6a129cccac9e682c1b0ebbcdc577f0a1a62491af213b1a2754d7_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:4436bfd5acbf25128a0ffa97a6fe54db3917fc2e5843bac38fd415453077f527_amd64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:832513a662fc4062b977857c548102efb1ddca6f1d77957dd2a9bdb8e21b92b2_arm64",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:b84c3be0f657bdcf774bb52a5a84d04da9f696786bcd78c73ed21397846db46d_s390x",
"9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:e02cc7128940815e916578e0f9ba899b47961e659afa861de1c58bbd2d7f1381_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:b65b749a71b5fb4e88c766125ef5300ddbb1091de66317f2e36a7b6fd1c24dcd_ppc64le",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c9e0b72dbb4d189a4af8710e4eb1939c0bcbc0c64829d63999faf88ee01471c9_arm64",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:d3104d2297bdc2fe3f660c3c0a8b0220dd34b9adedd7b5ff0177984eb013a41d_s390x",
"9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:ffa283d1841f5993c8a7efa17ecdbac722a16125c581309cc75e32167831bb81_amd64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:51ca0179fdfa587ead4e4c368713ad043969cc9157bb0e3fcf9421bfd1459f09_arm64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:b421b0785565d4bb573fae2ade2271d8985524981e67f8fa6be3dda042b8d8fd_amd64",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:b4eed47f93eec2c1236fdd3fc00d3e7d5b71724acbd90f0d974ae5209226d0e5_ppc64le",
"9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:f7fa4d19cc00a6858df774d335a9423623f1e5cff2429ca75f21876988333c0c_s390x",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:313cde7df3fd7048455e3d14574c3379c61fb4f09f08892d376ca4fe81b4ec88_arm64",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:969f519ff9b78ac6754857426b9b3fcd00a055e61bd9831e1ea5569f55ccb1ab_s390x",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f5f85025adc32a867f671ec774a2dcd40b0fce602ead3d38c6333e870c9a494d_amd64",
"9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f86562dc7d33fbeb46aeca54e7ebab5c1419557de19e0c009212e9ffd17b8009_ppc64le",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:2fa53a7c9f4bb4c5b4ef237a3e33bfe56c5f7d8b9949fec6da90a0579ee5c1a5_arm64",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:3f6260c4873940c679a97365400e03eac234568e18e8cf82aaa6d413b42f3d9d_amd64",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:7e32333dc0744b6447f901d249a58c45e67d4328e5be45a9cb113e457ecda5db_s390x",
"9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:a766c37590801c0bdfb09c6af7339f1c11f2f7305a40798697187d8bc2714546_ppc64le",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:68aed58064888b890b0771358eab07348814a5f6fdeb6e8b410e49cf2c690253_ppc64le",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:a7f07d46f4cda207815def9d9e1fe5bb45550ddcc026d4bfabd361265c77465b_s390x",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c58b30b96e0a63fa389cdf9c3dbc8d4518efd955d74bb39e0d19c58b67622995_amd64",
"9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:dd15df86f85136d26e97301861bdba147dfacea08b8cf09dc56910bf1e687ae1_arm64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:7d128aba7603a33a67ef0f67f560c5afd929cd78e2d3bf24a5958cbcc8b70661_amd64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:7f982f2d6f649ecf2e97e9b6c7b86f4e8bbf7f2c8ba0bbd1656a84d2123764ac_arm64",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:970bcea18b3222206505546f59dd33f0bb272995a001d4d2f46fa52d3c26fad1_s390x",
"9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:fbdc67f341dfdd5e6b0b69ab9ae11fa9852bef0e49d2776abec698894716766e_ppc64le",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:5d390cda6fee76c914d1bf38ea367eda83e06421a8dc9d5c17db128e99ced452_ppc64le",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:a4ca90b6eaff84c204833b5487f8b57a8ac25745366e3d6ba2b1ba9555e0b4b9_arm64",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:ba2294c81af7e74a2f9757873f289c2bfa50cf1b90303ee849c36f3bbaf0a629_s390x",
"9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:fbcad76f88280d74f8cc70a0a8f4eabc1b3562d814264c00c4aeace65ddd1685_amd64",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:07f3c4ff8a1066f0d96209a993a781c93c84cbaff45884a466c48cdb04f2ee0f_s390x",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5d41854e1cf846fb873df62ff19f8c6769a762e7ab10c59e31a7256fdc024141_ppc64le",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:7d73618e4322772f099856e6721913a74e49571c5193bbd6d70e0151deda85b5_amd64",
"9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:9a1cd526bdf8206047baa7aa966efbdf3f68d349a193a37a7361af584c73a514_arm64",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:2c0368006980f837171e02f424046c43c64a18d64c952304cde5101651c1eef1_ppc64le",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:7e2c1db62bb662bd592bfc4f905d4d6fbe8bcc5ec7b204ed5fc821855dd04475_arm64",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:cd8046e4690fb132c8b4729a7cd903d22c342cc490c52452a511993d89eb8ce8_s390x",
"9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:d5be048bb89baced719de180540409e23f0189405021fb14c738ee5497d379fe_amd64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:597a1c9f2313e7029813559f32b771ac9101d0dc3fa69e9bbe2074ad3749c9f8_arm64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:8a94a49a86e0ad8c316ca4ccfe22057c4de600a7a6348fde4cb9a074ced4b11d_amd64",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:91f5e194946f1e722ad77cf239b9186000d4620a0539694231470f9e37ee7b9c_ppc64le",
"9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:b2b6664a341979132fb48dfaccf5928d3364f67ae208c5bcc7e371b6daf76c02_s390x",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:1053810a6051c998474ffecb0edf869d0a9f7b5491a01b0901dc46b7e10d3471_amd64",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:1c292aa57a0df6b2454087b2c28ac8ceb15a4f38ba6167f89c065c96288dae22_arm64",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:68515253395e83121bdb0f46b34d20139be3f2f2857dc9bd5969808d93b19101_s390x",
"9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:8dfd2e7838078b8cd16a79acef292f542c1b2f2ff658e8b8d8675975d4949c83_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1a774795c355aaf54aa68465df0dbc979038f71e4d758564dcfe6bbe68add37b_s390x",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:5866e1a7df1766e0eee840ee52e1ff6d72fd8f1ce9592d170b6dac87030bb1ba_amd64",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:7c8d19c50a8c067702866679ca5609fc7ef45781e6934ad30c9897d632f017f2_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:8db6efd9bd0c001f314840a04a3af39d90edcee2c1346595ba306a238f41400e_arm64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:17b158cd10422f13ebe511a2df7ccb19c057f60a04de029066a92fd05615c574_arm64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b44d391b46d3a6e8822075e9370aebaa50ba9114655e1dca1ebee30dc35bf166_amd64",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:f85072dc26d07a83c243e735e1b80df866c3cfb860e48afcb10372e4e88b0c99_ppc64le",
"9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:ff4787b74e906427ccc3e9d1485a55c6f3a0138a4f9fcc8dea3fea8abc25572f_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:4e799bc36694566e319c04b42dec3b9e707eec363aab6aa2e522f8c463d22545_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:5726663d8466d5c781da49251d0d3e37c882ffe0495f77c399847acfa65e34e6_ppc64le",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:9f2428b59ef34fc9b37ea96934e327a012d7b77db07bf84c6879bf7816d81b03_amd64",
"9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:c0bafe5f26253a71e5c3e0599e8074945a64166384b285dc89bf1506b933dac5_arm64",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:4be2f7292d3128f185ac2ff4f19f5b6e8abbb052b1d48e372bd952af52ec5602_ppc64le",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:9b22e7673d2ec7de761191a6b2a08e93766ada717271f3c8321323777ac390d8_arm64",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d04a67c1b1605586ae6f3a25ea41b08ee8736960c22607b15b75d02a98f2b75a_s390x",
"9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d1166a218d844b76009456e2e4e075e1bc464d5fd7fe2392b89b0f525fabcf44_amd64",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:a417273cebecbd6765ef8cfee76842faac2e9009e21c49edf08beb1e437d045e_ppc64le",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:cfb1610e0b3c2d09647d6257e94a8eee13520f6a5cdf015f9274be810193f757_s390x",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:e9cfc8f62328454027058c94530de6f4138990c69ee2403729f81cf01ccfe160_amd64",
"9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:f54082f3d2cc8795868a748ef1facafe7e686fbdd7d9d26ce4742e7b3e88166f_arm64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:2decfd9ef35f313c9523b8aa9cacbe3591ac664a6b33f67cd4675c7efb4ebfee_amd64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:61a0a0c74d9120cd51664e4935415d8b927f13f1367d6e42dcc58583156e3549_arm64",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:aa99db54c55d6e4de3b6b38edb07f663c20330879bddd7e01fe07c09cc089692_s390x",
"9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:ea34a34b26744875a6405d295aba7f3b3eefe95a82c9f313b086fcc37e6f7758_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:159af992ad940236d2e12e5a9a96b6268d3dd0fb2e3d50298590714a3cc2ca64_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1ed41a512e64e2aaac90ce931838b24c0e87b2b00c22391f136927f21d1668c6_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:76be608f697d601af69e1cd1eb329988f6dc11d7f791dc87ffee93c9b4e19462_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:e65963ff0b8c4a67d29a814902b468a59a52721678d1a134f6ea5f50c8f209ce_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:13b47046e478c78322a7b1c1eedb139a6d20f7a12eba76744447808451365d4f_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:39a0489f4931228b4869e02b92c287aa55975c1fee03494efb65b6b7924dfbfa_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:5a61cd0e97b00f1ce157f52e40d08b42d70c8a8ba3ecee3d3ba1ac3b980c957d_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:7e88fe2019f0384dfcebdd7a614313783d389ec4e177958c4239892310ec7347_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:1971dadcae8f4cd6f83182ace52b4dd5fa140a4793e8068262d256366c5f49e9_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:a62f63e44bdc7e260674bd97c831866ac06b0a5706a6214fe9e176d78e2acdcd_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:c3cb4dad342e8093ecf9c6f2c2ef21ab3730da65a6faa53fa96661b30205b379_ppc64le",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:d918349890b6f5e6d3fbcc4aaadfc85a68dfa826413e1f17b9f44ebbffa237be_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:0752b4c34ad37099cce9f2eb7353d20c856e55d6c2d061aa6ec2bb30d233c7f8_amd64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:35396b89fef7697a90638cff6b3d3f470b50efd1e338231082d9981b078352c0_s390x",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:719ae5bcb99c622ce8d425c75058493c9f7831565906c86da3f07bc620423624_arm64",
"9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fc3851a9143f8d5ed09282f7693b19a1f3d0d4105b228a2b2ac5d76ee57a43ce_ppc64le",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0460beb9aafd8252c3ae014ce22a3274aab5dadf30c567a0fa4cecc0ee82f3f0_s390x",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:361bd96dc256ecea450f06296c50a1df82ebadbdbbadbb782d46005d27834f35_arm64",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:be732aecdb7cfbb8b5e9fc7d9c0a35689f9b9893e5ff8669343df1325d67b8f3_ppc64le",
"9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:eed08f44cbe82ac113843463baa2888f9db9a19842fa7a341ff1b80ce2cb1b3f_amd64",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:9801dc0236da72bf3bd06324a6519549c5c12b3679027f241056139f39e3769e_ppc64le",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:dc674aeba7abddfaae287c6b65b4915b97da4ee8b7f52c539d7532112e819332_s390x",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ec1b716e6dfaa7424c5f0237bf2bd03d782e28c8102c3a7c2f837024a281345a_arm64",
"9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:f41d452fa84c8175f7492d8d365c272a4edeaa12394e9ba798b62cf636e9d6dd_amd64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:1504cc510f790e9f3afbfa227da171da370e96ccbc765f022af9f15d03d7d3eb_arm64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:6db823deb952c5ea5a050592d8abc65a6baefd9c93818c5d476084f49e0fd9cc_amd64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:871aa0da83c95d09ccab54ba439714f882be4d3ddf5bac0dc976da8068092407_ppc64le",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:e3de9eca133476045f0a38062a68712214d6d7dd8dc0372ee2b03ca0b5c50e22_s390x",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:1089c7d9f66fe3c5c53c88ce13a95ba1edf10f5f30a46bea312aa9b9de8a0219_ppc64le",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:1a5eee37d4e2d6501f6f41062ac77aa1058e7702122fb8a63a92cf49a84439ff_arm64",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:58ac571afa7a7e568f5c149981c7f0bd9ae1396f3cbb1c19e039859fc55ace4d_s390x",
"9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:c46292e8f38fd6917ff385a783788e9bc1837a89596d1834136bea8ea6d7beb1_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:13601743ecb798b4e701bb5cdcdfcdc6f9bdca72a3a16dbeace7f01ed80677fc_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:1e17eb5ce26bb721c31fbaccd86f84864d4a65f0123200e4e0c61acc3341c5a0_arm64",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:7b4c9723dffe4f80b35621e72d25a785490652e8183ea9041f10b2443f704a28_ppc64le",
"9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:d87854fd2a2e3ec5fabab7b296136d04bbc9921ee9beb1c47066465bc67bc8b1_s390x",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:0e4527ae6eb39847906895597252e5309c5c8a7517ab63abffb199bfee278800_s390x",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:537ea377cb0b5ea51cc9aa40ee782b1fc62a77271d85f237712e30d57c1598b9_amd64",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:883050f682c8dd39c59c5667bc9956bb8edc86925f00a967c72b652c15a6a995_arm64",
"9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:9225b4eff0344b680a2551968991042af26ce1ee57f6e146db823a88fef17202_ppc64le",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:2e6e48e2a1eb9537ef1f309a79ad0b3356019b280f7bfcdcff266a95a7a476e7_arm64",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:68301d721aa9238a26248f9d810251da1033746c492ad74a947c757fde8b0d82_ppc64le",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:901a0b687f3f2b3285af83ad60aa70096f7d0167c0591c3344d4be147abd99b8_s390x",
"9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:a1f5ef8b49a5a5995d9e15029e3a66d10414b9177df428e9256ef3e32eb11e4b_amd64",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:0d48dabe4e58bf5ed1d4d94e0de0554ee6266b9b49adf6b84988faededa3cadd_ppc64le",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:7eb732b83dae8125b9bff7b17c9cc5e3aea53994e2fa2e525d1fb31f7a3ec651_arm64",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:85e712c48e7b1fd0c9d638fefa490c7cdd75861a31fcf852270196419ece80b6_s390x",
"9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:c4adaaf67565d9a08f2a77335b012f9da5aac5dd97205cc0505d1c4248a97e5a_amd64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:4dea9f61c2a9b2eeff7976ebdcae99905d9b4519171d09967d7bf505b8614d71_arm64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:82f953a4802785218310886026a0d84e7d91682960706e9bd07b8203888d604d_s390x",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:aad95955f2e99469a2cf4f307bd2d72cf7645d7f0ad914c94f39dcb6c70fdb10_amd64",
"9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:c6c6741e214007c9a4f46430fe1de4d7b1bce96aecff335e8155d324e6c58d9c_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:2334f844c32c699c9e3cba1133f654efc0f839bc29ffa95dcbd1d00b4606f487_arm64",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:437c5c3e4159707613430dce57c9f23de2d1d69fe38b0381afad1257310bf41f_s390x",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6a01c917cec17e747de35f99b9e40ad90527f26ef6759cddde61688826fd8ee3_amd64",
"9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:a4103d231dcaf4251faa183b9115d60654d7d0134d99601174fb564af5629139_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:09a4ff57bf934ad06aa25df65dbe0b2d49d02474d5558ebebbf4db88edbdbdc9_arm64",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1680e4ab31b03683da5ca81ed425aa24eb73377147086d0d89614f9b49aeb452_ppc64le",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:34dc629403688e3e85edfad53942adbb0ccfd275537fb0a3b45633f7f4879115_amd64",
"9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:f4edbbbc4760bb622c3b2c448689ca9c14385ddc67ce5e9c42ae1e7fc95af754_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-semver: Regular expression denial of service"
}
]
}
RHSA-2023:5363
Vulnerability from csaf_redhat - Published: 2023-09-26 14:56 - Updated: 2026-04-01 18:53A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.
A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.
A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding('spawn_sync') to run arbitrary code outside of the limits defined in a policy.json file.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (18). (BZ#2223313, BZ#2234404)\n\nSecurity Fix(es):\n\n* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)\n\n* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5363",
"url": "https://access.redhat.com/errata/RHSA-2023:5363"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "2223313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223313"
},
{
"category": "external",
"summary": "2230948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948"
},
{
"category": "external",
"summary": "2230955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955"
},
{
"category": "external",
"summary": "2230956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956"
},
{
"category": "external",
"summary": "2234404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234404"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5363.json"
}
],
"title": "Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2026-04-01T18:53:36+00:00",
"generator": {
"date": "2026-04-01T18:53:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:5363",
"initial_release_date": "2023-09-26T14:56:16+00:00",
"revision_history": [
{
"date": "2023-09-26T14:56:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-09-26T14:56:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:53:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"product": {
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src (nodejs:18)",
"product_id": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=src\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src (nodejs:18)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=src\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"product": {
"name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src (nodejs:18)",
"product_id": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=src\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product": {
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18)",
"product_id": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18)",
"product_id": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18)",
"product_id": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.6.7-1.18.17.1.1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"product": {
"name": "nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch (nodejs:18)",
"product_id": "nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch (nodejs:18)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=noarch\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"product": {
"name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18)",
"product_id": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=noarch\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"product": {
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18)",
"product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=noarch\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product": {
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18)",
"product_id": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18)",
"product_id": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18)",
"product_id": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.6.7-1.18.17.1.1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product": {
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18)",
"product_id": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18)",
"product_id": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18)",
"product_id": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.6.7-1.18.17.1.1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product": {
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18)",
"product_id": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18)",
"product_id": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.17.1-1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18)",
"product_id": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.6.7-1.18.17.1.1.module%2Bel9.2.0.z%2B19753%2B58118bc0?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9020020230825081254:rhel9"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18"
},
"product_reference": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18"
},
"product_reference": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18"
},
"product_reference": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18"
},
"product_reference": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
},
"product_reference": "nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18"
},
"product_reference": "nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18"
},
"product_reference": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18"
},
"product_reference": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18"
},
"product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18"
},
"product_reference": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18"
},
"product_reference": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18"
},
"product_reference": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
},
"product_reference": "npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5363"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2023-32002",
"cwe": {
"id": "CWE-1268",
"name": "Policy Privileges are not Assigned Consistently Between Control and Data Agents"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230948"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can be bypassed via Module._load",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important instead of Critical because it only impacts users of the policy mechanism that must be explicitly enabled using the `--experimental-policy` flag. This is not enabled by default.\n\nRed Hat\u0027s Secure Software Development Life Cycle utilizes a layered testing approach. This significantly increases attack complexity, because a compromised package must remain undetected for months to years in testing in upstream communities before it could be adopted into a Red Hat product. This long dwell-time reduces impact to Important.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32002"
},
{
"category": "external",
"summary": "RHBZ#2230948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5363"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Permissions policies can be bypassed via Module._load"
},
{
"cve": "CVE-2023-32006",
"cwe": {
"id": "CWE-213",
"name": "Exposure of Sensitive Information Due to Incompatible Policies"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230955"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32006"
},
{
"category": "external",
"summary": "RHBZ#2230955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5363"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()"
},
{
"cve": "CVE-2023-32559",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230956"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(\u0027spawn_sync\u0027) to run arbitrary code outside of the limits defined in a policy.json file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can be bypassed via process.binding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "When this CVE was reported, the policy.json file was still experimental in nature and not deployed and widely in environments,which is why at the time when this CVE was submitted,Redhat chose to classify this as moderare.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32559"
},
{
"category": "external",
"summary": "RHBZ#2230956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5363"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.2.0.z+19753+58118bc0.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.aarch64::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.ppc64le::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.s390x::nodejs:18",
"AppStream-9.2.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Permissions policies can be bypassed via process.binding"
}
]
}
RHSA-2023:7222
Vulnerability from csaf_redhat - Published: 2023-11-15 01:25 - Updated: 2026-04-01 18:54A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The Migration Toolkit for Containers (MTC) 1.8.2 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es) from Bugzilla:\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* tough-cookie: prototype pollution in cookie memstore (CVE-2023-26136)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7222",
"url": "https://access.redhat.com/errata/RHSA-2023:7222"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "2246122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246122"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7222.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.2 security and bug fix update",
"tracking": {
"current_release_date": "2026-04-01T18:54:06+00:00",
"generator": {
"date": "2026-04-01T18:54:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:7222",
"initial_release_date": "2023-11-15T01:25:46+00:00",
"revision_history": [
{
"date": "2023-11-15T01:25:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-15T01:25:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:54:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "8Base-RHMTC-1.8",
"product": {
"name": "8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhmt:1.8::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Migration Toolkit"
},
{
"branches": [
{
"category": "product_version",
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64",
"product": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64",
"product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.8.2-1"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64",
"product": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64",
"product_id": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-hook-runner-rhel8\u0026tag=v1.8.2-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64",
"product": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64",
"product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.8.2-1"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64",
"product": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64",
"product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.8.2-1"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64",
"product": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64",
"product_id": "rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-openvpn-rhel8\u0026tag=v1.8.2-1"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64",
"product": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64",
"product_id": "rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rhel8-operator\u0026tag=v1.8.2-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64",
"product": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64",
"product_id": "rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.8.2-3"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64",
"product": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64",
"product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.8.2-1"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64",
"product": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64",
"product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.8.2-1"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64",
"product": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64",
"product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.8.2-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8\u0026tag=v1.8.2-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64"
},
"product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64"
},
"product_reference": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64"
},
"product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64"
},
"product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64"
},
"product_reference": "rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64"
},
"product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64"
},
"product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64"
},
"product_reference": "rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64"
},
"product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64"
},
"product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-15T01:25:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7222"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"acknowledgments": [
{
"names": [
"Kokorin Vsevolod"
]
}
],
"cve": "CVE-2023-26136",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2023-07-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219310"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tough-cookie: prototype pollution in cookie memstore",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26136"
},
{
"category": "external",
"summary": "RHBZ#2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e",
"url": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/issues/282",
"url": "https://github.com/salesforce/tough-cookie/issues/282"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3",
"url": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3"
},
{
"category": "external",
"summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873",
"url": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873"
}
],
"release_date": "2023-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-15T01:25:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7222"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:4e6233e51dbc216a28ef991f3b302e0a069736274d38ef4ff2109c04ae5e3f49_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:73db4beeb2199823cfa10095b6c4826bfaf8105eb907f0306b775c497f3f6d74_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:8f4dc5fc5556e6483530c5c0e6c229982f817a4cc93cb222aa031aa7c7019b68_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:288df06c12dafcfe99e597010f5c43104a1b06ea1467bcc998e7fc7cb40a2c70_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:63330daa85a555d601379a72f68ef2f0fe17ff02c2e9b6ade86015e00bfafefe_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:c3a3adbca1dc38f75cbf940d26db533f7733f573bfb95ce0f5bb9e140d5bfe63_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:1ccaffa6fd0efe47ec779366fc7c615f24df8749555c41fbbcca4b044ad39269_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:c64c103aa239ef04954214ca7ae9e6eb234cae7e716902e1d695a5220ff8316c_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:80a6ac89439aef756037127b460fee129016846464e8327db6d30d9da912e4ec_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:55b9b7db18dde0134a454b4b8adc66c1dbd94d426756c0732c39cf053cb9d42e_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:9c1b54b7cf7117800228d737b20ed08c0a1f81e4b27dfad29819497a2bca9dbb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tough-cookie: prototype pollution in cookie memstore"
}
]
}
RHSA-2025:19094
Vulnerability from csaf_redhat - Published: 2025-10-23 20:33 - Updated: 2026-04-02 23:28A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.
A vulnerability was found in the nodejs-minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.
A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A flaw was found in the json5 package. The affected version of the json5 package could allow an attacker to set arbitrary and unexpected keys on the object returned from JSON5.parse.
There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1
The Spring Security annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue when using @PreAuthorize and other method security annotations, resulting in an authorization bypass.
The Spring Framework annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue if such annotations are used for authorization decisions.
A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
A symlink validation bypass flaw has been discovered in the npm tar-fs library. Affected versions are vulnerable to a symlink validation bypass if the destination directory is predictable with a specific tarball.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Dev Spaces 3.24.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Dev Spaces provides a cloud developer workspace server and a browser-based IDE built for teams and organizations. Dev Spaces runs in OpenShift and is well-suited for container-based development.\nThe 3.24 release is based on Eclipse Che 7.109 and uses the DevWorkspace engine to provide support for workspaces based on devfile v2.1 and v2.2.\nUsers still using the v1 standard should migrate as soon as possible.\nhttps://devfile.io/docs/2.2.0/migrating-to-devfile-v2\nDev Spaces supports OpenShift EUS releases v4.14 and higher. Users are expected to update to supported OpenShift releases in order to continue to get Dev Spaces updates.\nhttps://access.redhat.com/support/policy/updates/openshift#crw",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19094",
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.24/html/administration_guide/installing-devspaces",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.24/html/administration_guide/installing-devspaces"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-35065",
"url": "https://access.redhat.com/security/cve/CVE-2021-35065"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-25883",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-3517",
"url": "https://access.redhat.com/security/cve/CVE-2022-3517"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-46175",
"url": "https://access.redhat.com/security/cve/CVE-2022-46175"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-41248",
"url": "https://access.redhat.com/security/cve/CVE-2025-41248"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-41249",
"url": "https://access.redhat.com/security/cve/CVE-2025-41249"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-55163",
"url": "https://access.redhat.com/security/cve/CVE-2025-55163"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59343",
"url": "https://access.redhat.com/security/cve/CVE-2025-59343"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9566",
"url": "https://access.redhat.com/security/cve/CVE-2025-9566"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19094.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.24.0 Release.",
"tracking": {
"current_release_date": "2026-04-02T23:28:01+00:00",
"generator": {
"date": "2026-04-02T23:28:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2025:19094",
"initial_release_date": "2025-10-23T20:33:38+00:00",
"revision_history": [
{
"date": "2025-10-23T20:33:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-23T20:33:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-02T23:28:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product": {
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_devspaces:3.24::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS)"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3Aced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760676569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3A37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760670617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3Aaa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871872"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760713657"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871621"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3A55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760653610"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759870356"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Ab60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761088569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760713499"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3Accdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760747489"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3Ada65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871505"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871071"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761160160"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel10@sha256%3A2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761158501"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3A578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760921292"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3A6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760670617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3Ae8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760676569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3Adf658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871872"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3Aa90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760713657"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871621"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3A90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760653610"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759870356"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761088569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760713499"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-operator-bundle@sha256%3A34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761171498"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760747489"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871505"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871071"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761160160"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel10@sha256%3A79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761158501"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3A15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760921292"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3Ad7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760676569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3A98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760670617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3Aec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871872"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760713657"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3Aa4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871621"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3A9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760653610"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759870356"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761088569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760713499"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760747489"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3Ac3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871505"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871071"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Ade5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761160160"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel10@sha256%3Ab11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761158501"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3A2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760921292"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760676569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3Adec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760670617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871872"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760713657"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871621"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3A677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760653610"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759870356"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761088569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760713499"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3Ac490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760747489"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871505"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3Af44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1759871071"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761160160"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel10@sha256%3Af74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1761158501"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3Adc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.24-1760921292"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-35065",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-12-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156324"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glob-parent: Regular Expression Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The glob-parent package is a transitive dependency and this is not used directly in any of the Red Hat products. Hence, the impact is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-35065"
},
{
"category": "external",
"summary": "RHBZ#2156324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-35065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35065"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294",
"url": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294"
}
],
"release_date": "2022-12-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T20:33:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glob-parent: Regular Expression Denial of Service"
},
{
"cve": "CVE-2022-3517",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2022-06-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134609"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the nodejs-minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-minimatch: ReDoS via the braceExpand function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3517"
},
{
"category": "external",
"summary": "RHBZ#2134609",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134609"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3517"
}
],
"release_date": "2022-02-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T20:33:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-minimatch: ReDoS via the braceExpand function"
},
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T20:33:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2022-46175",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2022-12-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156263"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the json5 package. The affected version of the json5 package could allow an attacker to set arbitrary and unexpected keys on the object returned from JSON5.parse.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json5: Prototype Pollution in JSON5 via Parse Method",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The json5 package is a build-time dependency in Red Hat products and is not used in production runtime. Hence, the impact is set to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46175"
},
{
"category": "external",
"summary": "RHBZ#2156263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175"
},
{
"category": "external",
"summary": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h",
"url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h"
}
],
"release_date": "2022-12-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T20:33:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "json5: Prototype Pollution in JSON5 via Parse Method"
},
{
"acknowledgments": [
{
"names": [
"Paul Holzinger"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-9566",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-09-04T15:45:46.448000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2393152"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.\n\nBinary-Affected: podman\nUpstream-version-introduced: v4.0.0\nUpstream-version-fixed: v5.6.1",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: Podman kube play command may overwrite host files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having the Important severity. This happens because of the consequences of an successful attack and the low complexity (AC:L) on exploiting this vulnerability. Although the attacker cannot control the content written to the target file, depending on which file was targeted, the exploitation of this flaw may lead sensitive data corruption (I:H) and leading the system to crash resulting in a Denial of Service attack (A:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9566"
},
{
"category": "external",
"summary": "RHBZ#2393152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566"
},
{
"category": "external",
"summary": "https://github.com/containers/podman/commit/43fbde4e665fe6cee6921868f04b7ccd3de5ad89",
"url": "https://github.com/containers/podman/commit/43fbde4e665fe6cee6921868f04b7ccd3de5ad89"
},
{
"category": "external",
"summary": "https://github.com/containers/podman/security/advisories/GHSA-wp3j-xq48-xpjw",
"url": "https://github.com/containers/podman/security/advisories/GHSA-wp3j-xq48-xpjw"
}
],
"release_date": "2025-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T20:33:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
},
{
"category": "workaround",
"details": "Red Hat advises to not run the podman kube play command with untrusted Kubernetes YAML file as input, additionally review the Kubernetes YAML file before running it through podman may help to catch maliciously crafted secretes or volumes that may be used to exploit this vulnerability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "podman: Podman kube play command may overwrite host files"
},
{
"cve": "CVE-2025-41248",
"cwe": {
"id": "CWE-289",
"name": "Authentication Bypass by Alternate Name"
},
"discovery_date": "2025-09-16T11:00:42.699993+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395723"
}
],
"notes": [
{
"category": "description",
"text": "The Spring Security annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue when using @PreAuthorize and other method security annotations, resulting in an authorization bypass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.springframework.security/spring-security-core: Spring Security authorization bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-41248"
},
{
"category": "external",
"summary": "RHBZ#2395723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395723"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-41248",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41248"
},
{
"category": "external",
"summary": "https://github.com/spring-projects/spring-security/issues/17898",
"url": "https://github.com/spring-projects/spring-security/issues/17898"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-41248",
"url": "https://spring.io/security/cve-2025-41248"
}
],
"release_date": "2025-09-16T10:10:59.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T20:33:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.springframework.security/spring-security-core: Spring Security authorization bypass"
},
{
"cve": "CVE-2025-41249",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-09-16T11:00:49.967990+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395725"
}
],
"notes": [
{
"category": "description",
"text": "The Spring Framework annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue if such annotations are used for authorization decisions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.springframework/spring-core: Spring Framework Annotation Detection Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-41249"
},
{
"category": "external",
"summary": "RHBZ#2395725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395725"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-41249",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41249"
},
{
"category": "external",
"summary": "https://github.com/spring-projects/spring-framework/issues/35342",
"url": "https://github.com/spring-projects/spring-framework/issues/35342"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-41249",
"url": "https://spring.io/security/cve-2025-41249"
}
],
"release_date": "2025-09-16T10:15:34.118000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T20:33:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.springframework/spring-core: Spring Framework Annotation Detection Vulnerability"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-08-13T15:01:55.372237+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2388252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a denial of service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55163"
},
{
"category": "external",
"summary": "RHBZ#2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4",
"url": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-08-13T14:17:36.111000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T20:33:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability"
},
{
"cve": "CVE-2025-59343",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-09-24T18:01:19.612438+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397901"
}
],
"notes": [
{
"category": "description",
"text": "A symlink validation bypass flaw has been discovered in the npm tar-fs library. Affected versions are vulnerable to a symlink validation bypass if the destination directory is predictable with a specific tarball.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tar-fs: tar-fs symlink validation bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59343"
},
{
"category": "external",
"summary": "RHBZ#2397901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397901"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59343"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59343",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59343"
},
{
"category": "external",
"summary": "https://github.com/mafintosh/tar-fs/commit/0bd54cdf06da2b7b5b95cd4b062c9f4e0a8c4e09",
"url": "https://github.com/mafintosh/tar-fs/commit/0bd54cdf06da2b7b5b95cd4b062c9f4e0a8c4e09"
},
{
"category": "external",
"summary": "https://github.com/mafintosh/tar-fs/security/advisories/GHSA-vj76-c3g6-qr5v",
"url": "https://github.com/mafintosh/tar-fs/security/advisories/GHSA-vj76-c3g6-qr5v"
}
],
"release_date": "2025-09-24T17:43:34.728000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T20:33:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:36fc35cd401140f3df7c45b8cd5682b7468a5dc8a6288d999508a2c50484eada_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:ced1d8366bbb102fb17a39e445fe3fe180db0d1db4115ba10fc71fdfa27782fe_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:d7d97ca085838a96772d21b3db0e869ffbaa469a2e66e8566ad3e6464fe2ddcd_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-rhel9@sha256:e8cb98ec2e7a8ad2ccd69796bc78b812df25bcb8be60808f1b66b56cc0e2fd99_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:37ce33f42bd627f17f153fb01364daa64b9b6b6196254ff64e7f85af1ba53f8f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c98ccb6afaed1d71afdd10bc3e35c4edaf757d563815996b2440581d5391f02_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:98412432e1e6f4351001fd847584af86edfabc1c2434e3d2cced1b6fd8b37901_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:dec9de28192bf1d47f578c7a4ed859c5168333bb4354f78eda5aa0c8c296ced9_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:2b77edd3e3bb1f26f2c39d461ebca6171f712bd9f57a8e1df6067e381d36f87d_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:aa83c8aa82f59c509cc3758d0e71bb868f073814fc54a142be267780eff493eb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:df658ffb4c2f81aefab81795a1603cec97b67e876cd0bf4927323b5bcd8732f3_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/configbump-rhel9@sha256:ec0932411e4b6de9019cd1fd775549e9e2faa2af2a387cc63221d7548fc3412c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:26a2fb048b53a3179390e8ce7b00525cb9a70ea6efc42126192c75e145526c97_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:5bf20016be741f97e1b4b59b12b055cd39540fc7bdf8799b14c8ade083f64c38_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:872a98325c3fd3840670828d201e2d027f659335521ba27fb07f7c20f116474c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a90ee7e5df3018c9d084d8349be7891ca6289558e14f0f94b95133f0c02d64eb_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:34c42246ae490bce91292bcabf350cd34d091f7ff32bcb4bb012d6380f17d7e5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:01afee0b101671c52190be73af50b655634333b323561fa83cf31088257ba236_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:1173a78f4140540163422db5f8bad8f11104e7254109912f38452f38ea6e2161_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:27cfd1b12714961bc952fa86f53758ae3da05f397c4d75d5f4cf09dd5949a828_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:3a79083efd75a09e14e05234ad1c9f5f45e4204c93ac6066429643c234ef04d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:507a595e8d25bf460f0147ca5e141011c7bec425f96b05815f9d57ad500599af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:9179381519e3c41923792528421b3831abe2a2cb1f6e5bd106c5ce96213af9c7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:98c582c0e47250a7c17c592e84f484fcd499aa4409f7f7155b8361e26ca2df0f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a4da702c9c8f46b44c3eb94ce92b16fdd9fb8607cfb26adeaf71a473eafe766f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55a135cafa015407f9e22333dd396c32e0ca87d9a94779c42ce32ee4f2e4adcb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:677a234cd1441ec9c2043d96f418fab48892023805775390f2c4a6bf78d298d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:90bb747ddb0bdc57fd9f3f30ce89d88af861c9a5308dcc9954344d8c1d424128_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:9a7b13f5a8027bf2a395bb2110294029d41ca96ed68bfdb78162b0265a96b16f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:10cbe01cec1118bd368156a472d7d52ca5903d8efae56b7059cd288957b051bf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:2d916e23a8361f24f267da019781965f7745a1a02efb0462e2b29f71e083c685_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:66317bd7e5634d529ec545f9aa8a2ff38cabb4c8773b99b7f94842a5bd243383_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/machineexec-rhel9@sha256:79a5db5ac28dc8607ead1c243144ce4b7b0c4619bd843913dbea3b53f7447a10_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:11d71f82faabf36868cf538a6242b600854e4bc9bcf4fb8f875ffc0487b28053_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1254010dc89cccd136a3d4174f89d324304347f8088077aedebd3b7e44ed1616_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:2464577ba1fedeec77a2b80b8bb1ff786beb63fbf78bbd9106d14901c7ebb28f_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b60273956fc6674e9296a458188069f29117ef785a0439e3f8436bb1ac650a3b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:28e5dd2b9c4ceaeb10fb92f4133a26f0170407871ce7f56bc546a575241e5cc7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:c490ebeb2e2f313f8a8318c3070561edc6545453214142df95c6d1601d2714d5_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:ccdc171ff4d7333c4279c15eeef7f9c221d65c6d072eebd7f04d71b8f7133d6a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:053a878beb49fce4487d96d122f3e294ab7142a6dec81367c08ccf86598318b1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:6dbc2205ec22dd10d079d91c7ecc1920c2f3f2d7a6a4eeb45e6ce473733744af_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:c3f573e7946bd26542747ccbc99f640efd3e189766b53b1072c8a225942b2351_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/server-rhel9@sha256:da65fa9d69840eb58c3da430e3f305aa27ec2164f97bab82e075ee0f266207fb_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:134bfa5b675bdae58a57de00ea5edbef21e3da370460971aa355359545320926_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:94291bf8bf2c61bbec1c1641466356aaa43ac4abb516f935410cb6632a4251ac_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:9c2ef8299d58f81ef9e82aeac792aa888f31786d7b23fe29a3891b529791ec42_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/traefik-rhel9@sha256:f44d3314a640d6d863455d76005a52d02a41c95d19973072e626e63f687def46_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:2b35152ce2aad4ea14cf28d731467da4758aa275a650e883082391cb1c0e73c6_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:79d9224c441f26875adfc4188f78454333b4d3b0d7418f0218ba892b893ec35a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b11d599f95e2d7e08efc9d481d5cc654504bda1a1d4bb963217c3a8312ae5e71_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel10@sha256:f74bcd3011b0eff48ba18b446de5a1d8bddd13a4bde30c787dc1ced5d0a06550_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:15dcb0c25b2295f58ab725e633ecacc7f0aa1ab857d627e8c0e19b7b15102a6a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:2767e17a1bab86674cb31e4ebbb8b095b1c45ee3ca4a3888e8d140727d94fa9f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:578054a3f30b30ac5560403166b59c1d895394ee9e8a2396591a8c02955a5cc4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-base-rhel9@sha256:dc2cbe1eec3743aed7c51cca595d7176395778458360a4111520fda14f84e821_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2579266bc90b8979bb4299eefcd4e4eaa2947a5bec5c50563d743ce7f6605622_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:2a4b0f6da2735ea2028116288bddd5d3475983230d91e52bca9c5e3225eda2d4_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:91b615e55b5f38d40e99884b51885f1aa19effadeeff36e226240d8a1957c5b6_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.24:registry.redhat.io/devspaces/udi-rhel9@sha256:de5ed611e8295c8e87d0ad6cbf440752801a964e7630f61d9a59c768efc5b996_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tar-fs: tar-fs symlink validation bypass"
}
]
}
RHSA-2024:5955
Vulnerability from csaf_redhat - Published: 2024-08-28 18:01 - Updated: 2026-04-01 18:55A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multicluster Engine for Kubernetes 2.6.2 General Availability release images, \nwhich fix bugs and update container images.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Multicluster engine for Kubernetes v2.6.2 images\n\nMulticluster engine for Kubernetes provides the foundational components\nthat are necessary for the centralized management of multiple\nKubernetes-based clusters across data centers, public clouds, and private\nclouds.\n\nYou can use the engine to create new Red Hat OpenShift Container Platform\nclusters or to bring existing Kubernetes-based clusters under management by\nimporting them. After the clusters are managed, you can use the APIs that\nare provided by the engine to distribute configuration based on placement\npolicy.\n\nSecurity fix(es):\nCVE-2022-25883 nodejs-semver: Regular expression denial of service",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5955",
"url": "https://access.redhat.com/errata/RHSA-2024:5955"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "ACM-13036",
"url": "https://issues.redhat.com/browse/ACM-13036"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5955.json"
}
],
"title": "Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.6.2 security updates and bug fixes",
"tracking": {
"current_release_date": "2026-04-01T18:55:47+00:00",
"generator": {
"date": "2026-04-01T18:55:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:5955",
"initial_release_date": "2024-08-28T18:01:10+00:00",
"revision_history": [
{
"date": "2024-08-28T18:01:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-28T18:01:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:55:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "multicluster engine for Kubernetes 2.6 for RHEL 9",
"product": {
"name": "multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:multicluster_engine:2.6::el9"
}
}
},
{
"category": "product_name",
"name": "multicluster engine for Kubernetes 2.6 for RHEL 8",
"product": {
"name": "multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:multicluster_engine:2.6::el8"
}
}
}
],
"category": "product_family",
"name": "multicluster engine for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "multicluster-engine/addon-manager-rhel9@sha256:a5cb6bff2d64bbebc5ddcc2cc44481acf545e92cf52b4acf28588e64e2f33d7d_ppc64le",
"product": {
"name": "multicluster-engine/addon-manager-rhel9@sha256:a5cb6bff2d64bbebc5ddcc2cc44481acf545e92cf52b4acf28588e64e2f33d7d_ppc64le",
"product_id": "multicluster-engine/addon-manager-rhel9@sha256:a5cb6bff2d64bbebc5ddcc2cc44481acf545e92cf52b4acf28588e64e2f33d7d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/addon-manager-rhel9@sha256:a5cb6bff2d64bbebc5ddcc2cc44481acf545e92cf52b4acf28588e64e2f33d7d?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/addon-manager-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:c10d4e4efda73c7c1867a13391e03d408762f1069a0c2a86375d9343b36f5410_ppc64le",
"product": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:c10d4e4efda73c7c1867a13391e03d408762f1069a0c2a86375d9343b36f5410_ppc64le",
"product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:c10d4e4efda73c7c1867a13391e03d408762f1069a0c2a86375d9343b36f5410_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/assisted-image-service-rhel8@sha256:c10d4e4efda73c7c1867a13391e03d408762f1069a0c2a86375d9343b36f5410?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:ab2d453fc966ddbc6a1a5012b5f70e4be84cd1de739c8b6789ff58288042daec_ppc64le",
"product": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:ab2d453fc966ddbc6a1a5012b5f70e4be84cd1de739c8b6789ff58288042daec_ppc64le",
"product_id": "multicluster-engine/assisted-installer-agent-rhel8@sha256:ab2d453fc966ddbc6a1a5012b5f70e4be84cd1de739c8b6789ff58288042daec_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:ab2d453fc966ddbc6a1a5012b5f70e4be84cd1de739c8b6789ff58288042daec?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-agent-rhel8\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-rhel8@sha256:3d7e94bcd1ea27ebb3c786053a53ff6c5b280b666996378f446ef3b5a045b09f_ppc64le",
"product": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:3d7e94bcd1ea27ebb3c786053a53ff6c5b280b666996378f446ef3b5a045b09f_ppc64le",
"product_id": "multicluster-engine/assisted-installer-rhel8@sha256:3d7e94bcd1ea27ebb3c786053a53ff6c5b280b666996378f446ef3b5a045b09f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-rhel8@sha256:3d7e94bcd1ea27ebb3c786053a53ff6c5b280b666996378f446ef3b5a045b09f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:3ae4da39ce451793b88d2aaf68a963273642ca967189e477820ac4bf3db3718d_ppc64le",
"product": {
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:3ae4da39ce451793b88d2aaf68a963273642ca967189e477820ac4bf3db3718d_ppc64le",
"product_id": "multicluster-engine/assisted-installer-controller-rhel8@sha256:3ae4da39ce451793b88d2aaf68a963273642ca967189e477820ac4bf3db3718d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-controller-rhel8@sha256:3ae4da39ce451793b88d2aaf68a963273642ca967189e477820ac4bf3db3718d?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-controller-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:c45da32cba975301e6bae6a68a07b89776309e2933c493b3d31adcf01e102273_ppc64le",
"product": {
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:c45da32cba975301e6bae6a68a07b89776309e2933c493b3d31adcf01e102273_ppc64le",
"product_id": "multicluster-engine/assisted-service-8-rhel8@sha256:c45da32cba975301e6bae6a68a07b89776309e2933c493b3d31adcf01e102273_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/assisted-service-8-rhel8@sha256:c45da32cba975301e6bae6a68a07b89776309e2933c493b3d31adcf01e102273?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-service-8-rhel8\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:69ed5692ef73bb6f700889df40d300aeb4d5b931b24d5b267dfc1a3ae81591e6_ppc64le",
"product": {
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:69ed5692ef73bb6f700889df40d300aeb4d5b931b24d5b267dfc1a3ae81591e6_ppc64le",
"product_id": "multicluster-engine/assisted-service-9-rhel9@sha256:69ed5692ef73bb6f700889df40d300aeb4d5b931b24d5b267dfc1a3ae81591e6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/assisted-service-9-rhel9@sha256:69ed5692ef73bb6f700889df40d300aeb4d5b931b24d5b267dfc1a3ae81591e6?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-service-9-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-rhel9@sha256:03f598ff4299c16803575ecbcc57ce26763659526145da49c70dfb2cf9af53fe_ppc64le",
"product": {
"name": "multicluster-engine/cluster-api-rhel9@sha256:03f598ff4299c16803575ecbcc57ce26763659526145da49c70dfb2cf9af53fe_ppc64le",
"product_id": "multicluster-engine/cluster-api-rhel9@sha256:03f598ff4299c16803575ecbcc57ce26763659526145da49c70dfb2cf9af53fe_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-rhel9@sha256:03f598ff4299c16803575ecbcc57ce26763659526145da49c70dfb2cf9af53fe?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"product": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"product_id": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"product": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a503850af5234e9cda86a542473cee328da17d1088e9a68b71e899a08cff4f1b_ppc64le",
"product": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a503850af5234e9cda86a542473cee328da17d1088e9a68b71e899a08cff4f1b_ppc64le",
"product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a503850af5234e9cda86a542473cee328da17d1088e9a68b71e899a08cff4f1b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel9@sha256:a503850af5234e9cda86a542473cee328da17d1088e9a68b71e899a08cff4f1b?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:e04cae5b2bd55331fe04ae2aea8a1db34f68ddf6bf98ee08cd551b874cd9d4f7_ppc64le",
"product": {
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:e04cae5b2bd55331fe04ae2aea8a1db34f68ddf6bf98ee08cd551b874cd9d4f7_ppc64le",
"product_id": "multicluster-engine/clusterclaims-controller-rhel9@sha256:e04cae5b2bd55331fe04ae2aea8a1db34f68ddf6bf98ee08cd551b874cd9d4f7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel9@sha256:e04cae5b2bd55331fe04ae2aea8a1db34f68ddf6bf98ee08cd551b874cd9d4f7?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:5d249467164c9c364cd4dbf8023b53411b2ecd1cb1330d4f1ab7868bdf851021_ppc64le",
"product": {
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:5d249467164c9c364cd4dbf8023b53411b2ecd1cb1330d4f1ab7868bdf851021_ppc64le",
"product_id": "multicluster-engine/cluster-curator-controller-rhel9@sha256:5d249467164c9c364cd4dbf8023b53411b2ecd1cb1330d4f1ab7868bdf851021_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel9@sha256:5d249467164c9c364cd4dbf8023b53411b2ecd1cb1330d4f1ab7868bdf851021?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2d90d279d73845e9b04fb7a3289ce356c4f076dc6934e6b69b3b4ca575a2ff_ppc64le",
"product": {
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2d90d279d73845e9b04fb7a3289ce356c4f076dc6934e6b69b3b4ca575a2ff_ppc64le",
"product_id": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2d90d279d73845e9b04fb7a3289ce356c4f076dc6934e6b69b3b4ca575a2ff_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel9@sha256:3b2d90d279d73845e9b04fb7a3289ce356c4f076dc6934e6b69b3b4ca575a2ff?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:45084f59b43f0b380e661b82e338c8ccffedbfe59cd79034c40fcf9056ae422c_ppc64le",
"product": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:45084f59b43f0b380e661b82e338c8ccffedbfe59cd79034c40fcf9056ae422c_ppc64le",
"product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:45084f59b43f0b380e661b82e338c8ccffedbfe59cd79034c40fcf9056ae422c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel9@sha256:45084f59b43f0b380e661b82e338c8ccffedbfe59cd79034c40fcf9056ae422c?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:97cc35103eb35f218af98d983157ffb2f893333d68ca232411ab2fae88b90971_ppc64le",
"product": {
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:97cc35103eb35f218af98d983157ffb2f893333d68ca232411ab2fae88b90971_ppc64le",
"product_id": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:97cc35103eb35f218af98d983157ffb2f893333d68ca232411ab2fae88b90971_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel9@sha256:97cc35103eb35f218af98d983157ffb2f893333d68ca232411ab2fae88b90971?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:4140916af5904c58dcf636d6a80ccd180c9f7f417ade6de9b18a9d17b93e0f7a_ppc64le",
"product": {
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:4140916af5904c58dcf636d6a80ccd180c9f7f417ade6de9b18a9d17b93e0f7a_ppc64le",
"product_id": "multicluster-engine/cluster-proxy-rhel9@sha256:4140916af5904c58dcf636d6a80ccd180c9f7f417ade6de9b18a9d17b93e0f7a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel9@sha256:4140916af5904c58dcf636d6a80ccd180c9f7f417ade6de9b18a9d17b93e0f7a?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"product": {
"name": "multicluster-engine/console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"product_id": "multicluster-engine/console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"product": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"product_id": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/discovery-rhel9@sha256:5b912b55233d31d8b11e5dcd764501e7d3677e6c16695e79e0626ea8052a4b1f_ppc64le",
"product": {
"name": "multicluster-engine/discovery-rhel9@sha256:5b912b55233d31d8b11e5dcd764501e7d3677e6c16695e79e0626ea8052a4b1f_ppc64le",
"product_id": "multicluster-engine/discovery-rhel9@sha256:5b912b55233d31d8b11e5dcd764501e7d3677e6c16695e79e0626ea8052a4b1f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel9@sha256:5b912b55233d31d8b11e5dcd764501e7d3677e6c16695e79e0626ea8052a4b1f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel9\u0026tag=v2.6.2-9"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hive-rhel9@sha256:f95c940003b1b1a21302ce165b2760348c2c47a7155d78daf4ee7eb409524142_ppc64le",
"product": {
"name": "multicluster-engine/hive-rhel9@sha256:f95c940003b1b1a21302ce165b2760348c2c47a7155d78daf4ee7eb409524142_ppc64le",
"product_id": "multicluster-engine/hive-rhel9@sha256:f95c940003b1b1a21302ce165b2760348c2c47a7155d78daf4ee7eb409524142_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel9@sha256:f95c940003b1b1a21302ce165b2760348c2c47a7155d78daf4ee7eb409524142?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"product": {
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"product_id": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"product": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:df909b7eb08718a1c917fd812357ec40835cab57a8e2b2f25d6d35f45e5b6ab8_ppc64le",
"product": {
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:df909b7eb08718a1c917fd812357ec40835cab57a8e2b2f25d6d35f45e5b6ab8_ppc64le",
"product_id": "multicluster-engine/hypershift-cli-rhel9@sha256:df909b7eb08718a1c917fd812357ec40835cab57a8e2b2f25d6d35f45e5b6ab8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel9@sha256:df909b7eb08718a1c917fd812357ec40835cab57a8e2b2f25d6d35f45e5b6ab8?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-cli-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:930028ea4fe287a7f3c2ec59216725b8918c284db16fbb2bc6c2726b8bad6d36_ppc64le",
"product": {
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:930028ea4fe287a7f3c2ec59216725b8918c284db16fbb2bc6c2726b8bad6d36_ppc64le",
"product_id": "multicluster-engine/hypershift-rhel9-operator@sha256:930028ea4fe287a7f3c2ec59216725b8918c284db16fbb2bc6c2726b8bad6d36_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel9-operator@sha256:930028ea4fe287a7f3c2ec59216725b8918c284db16fbb2bc6c2726b8bad6d36?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel9-operator\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/image-based-install-rhel9@sha256:0ae5132a4a57e208a654374fe4489da16259d59e929ced2b4a7c216227774ea5_ppc64le",
"product": {
"name": "multicluster-engine/image-based-install-rhel9@sha256:0ae5132a4a57e208a654374fe4489da16259d59e929ced2b4a7c216227774ea5_ppc64le",
"product_id": "multicluster-engine/image-based-install-rhel9@sha256:0ae5132a4a57e208a654374fe4489da16259d59e929ced2b4a7c216227774ea5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/image-based-install-rhel9@sha256:0ae5132a4a57e208a654374fe4489da16259d59e929ced2b4a7c216227774ea5?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/image-based-install-rhel9\u0026tag=v2.6.2-22"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:be27bde4cc9fe5ab30e9d0b2bd5b65724c23f4a2c6a774c70253b02a567b5e7f_ppc64le",
"product": {
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:be27bde4cc9fe5ab30e9d0b2bd5b65724c23f4a2c6a774c70253b02a567b5e7f_ppc64le",
"product_id": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:be27bde4cc9fe5ab30e9d0b2bd5b65724c23f4a2c6a774c70253b02a567b5e7f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-mce-rhel9@sha256:be27bde4cc9fe5ab30e9d0b2bd5b65724c23f4a2c6a774c70253b02a567b5e7f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:ae230b8ede9d4d3f1d8fad744c979518279cebe62e9d066bcc0691d3f1c0c019_ppc64le",
"product": {
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:ae230b8ede9d4d3f1d8fad744c979518279cebe62e9d066bcc0691d3f1c0c019_ppc64le",
"product_id": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:ae230b8ede9d4d3f1d8fad744c979518279cebe62e9d066bcc0691d3f1c0c019_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel9@sha256:ae230b8ede9d4d3f1d8fad744c979518279cebe62e9d066bcc0691d3f1c0c019?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"product": {
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"product_id": "multicluster-engine/managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"product": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:425d22934abc149c70946caac4800590ae26d0ec732b17b3140c3cf943afc1f8_ppc64le",
"product": {
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:425d22934abc149c70946caac4800590ae26d0ec732b17b3140c3cf943afc1f8_ppc64le",
"product_id": "multicluster-engine/multicloud-manager-rhel9@sha256:425d22934abc149c70946caac4800590ae26d0ec732b17b3140c3cf943afc1f8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel9@sha256:425d22934abc149c70946caac4800590ae26d0ec732b17b3140c3cf943afc1f8?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/must-gather-rhel9@sha256:cad141cf8d10a7b251dab93ae23fe2be15847f68a040c0580bcc593ef25fc15c_ppc64le",
"product": {
"name": "multicluster-engine/must-gather-rhel9@sha256:cad141cf8d10a7b251dab93ae23fe2be15847f68a040c0580bcc593ef25fc15c_ppc64le",
"product_id": "multicluster-engine/must-gather-rhel9@sha256:cad141cf8d10a7b251dab93ae23fe2be15847f68a040c0580bcc593ef25fc15c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256:cad141cf8d10a7b251dab93ae23fe2be15847f68a040c0580bcc593ef25fc15c?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/mce-operator-bundle@sha256:b56682e6b4d08a6992df430a0da878e7977027216776789e2887a110c28c3e2b_ppc64le",
"product": {
"name": "multicluster-engine/mce-operator-bundle@sha256:b56682e6b4d08a6992df430a0da878e7977027216776789e2887a110c28c3e2b_ppc64le",
"product_id": "multicluster-engine/mce-operator-bundle@sha256:b56682e6b4d08a6992df430a0da878e7977027216776789e2887a110c28c3e2b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mce-operator-bundle@sha256:b56682e6b4d08a6992df430a0da878e7977027216776789e2887a110c28c3e2b?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.6.2-13"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/backplane-rhel9-operator@sha256:6c09d889e22b3684e343e37776d2ddaea943f00fa3440565e95a2a098c0e8ca5_ppc64le",
"product": {
"name": "multicluster-engine/backplane-rhel9-operator@sha256:6c09d889e22b3684e343e37776d2ddaea943f00fa3440565e95a2a098c0e8ca5_ppc64le",
"product_id": "multicluster-engine/backplane-rhel9-operator@sha256:6c09d889e22b3684e343e37776d2ddaea943f00fa3440565e95a2a098c0e8ca5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel9-operator@sha256:6c09d889e22b3684e343e37776d2ddaea943f00fa3440565e95a2a098c0e8ca5?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel9-operator\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/placement-rhel9@sha256:3584c7a2498f8d3714bd478ebf3561440dbead1c0058c21b7b137061782ac783_ppc64le",
"product": {
"name": "multicluster-engine/placement-rhel9@sha256:3584c7a2498f8d3714bd478ebf3561440dbead1c0058c21b7b137061782ac783_ppc64le",
"product_id": "multicluster-engine/placement-rhel9@sha256:3584c7a2498f8d3714bd478ebf3561440dbead1c0058c21b7b137061782ac783_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel9@sha256:3584c7a2498f8d3714bd478ebf3561440dbead1c0058c21b7b137061782ac783?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:f28e006870115a0f807fd6e7603dc3b5427d6aac9a7252c2f9821f40dd5cda63_ppc64le",
"product": {
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:f28e006870115a0f807fd6e7603dc3b5427d6aac9a7252c2f9821f40dd5cda63_ppc64le",
"product_id": "multicluster-engine/provider-credential-controller-rhel9@sha256:f28e006870115a0f807fd6e7603dc3b5427d6aac9a7252c2f9821f40dd5cda63_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel9@sha256:f28e006870115a0f807fd6e7603dc3b5427d6aac9a7252c2f9821f40dd5cda63?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-rhel9@sha256:1e620a945b98f982970118aed4b25331a8b4dba2ed4e879213a26f1976181cf7_ppc64le",
"product": {
"name": "multicluster-engine/registration-rhel9@sha256:1e620a945b98f982970118aed4b25331a8b4dba2ed4e879213a26f1976181cf7_ppc64le",
"product_id": "multicluster-engine/registration-rhel9@sha256:1e620a945b98f982970118aed4b25331a8b4dba2ed4e879213a26f1976181cf7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel9@sha256:1e620a945b98f982970118aed4b25331a8b4dba2ed4e879213a26f1976181cf7?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-operator-rhel9@sha256:1d3327756a221735149cd26a6d5f0d80cc44e16b7c89ec6ccf665d930eb64012_ppc64le",
"product": {
"name": "multicluster-engine/registration-operator-rhel9@sha256:1d3327756a221735149cd26a6d5f0d80cc44e16b7c89ec6ccf665d930eb64012_ppc64le",
"product_id": "multicluster-engine/registration-operator-rhel9@sha256:1d3327756a221735149cd26a6d5f0d80cc44e16b7c89ec6ccf665d930eb64012_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel9@sha256:1d3327756a221735149cd26a6d5f0d80cc44e16b7c89ec6ccf665d930eb64012?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/work-rhel9@sha256:28d013309629353d8439be41123c1cd7d2c007bd66be589fc7da66f180943dd7_ppc64le",
"product": {
"name": "multicluster-engine/work-rhel9@sha256:28d013309629353d8439be41123c1cd7d2c007bd66be589fc7da66f180943dd7_ppc64le",
"product_id": "multicluster-engine/work-rhel9@sha256:28d013309629353d8439be41123c1cd7d2c007bd66be589fc7da66f180943dd7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel9@sha256:28d013309629353d8439be41123c1cd7d2c007bd66be589fc7da66f180943dd7?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel9\u0026tag=v2.6.2-7"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "multicluster-engine/addon-manager-rhel9@sha256:d6533bb8ee76ebc8554d086c5a9e802d1507e12b7d75c98692978421f743c903_amd64",
"product": {
"name": "multicluster-engine/addon-manager-rhel9@sha256:d6533bb8ee76ebc8554d086c5a9e802d1507e12b7d75c98692978421f743c903_amd64",
"product_id": "multicluster-engine/addon-manager-rhel9@sha256:d6533bb8ee76ebc8554d086c5a9e802d1507e12b7d75c98692978421f743c903_amd64",
"product_identification_helper": {
"purl": "pkg:oci/addon-manager-rhel9@sha256:d6533bb8ee76ebc8554d086c5a9e802d1507e12b7d75c98692978421f743c903?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/addon-manager-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:b7c150e874c43418d35091154f768906eb0ad8dd3ed509465922c6ebb345769e_amd64",
"product": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:b7c150e874c43418d35091154f768906eb0ad8dd3ed509465922c6ebb345769e_amd64",
"product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:b7c150e874c43418d35091154f768906eb0ad8dd3ed509465922c6ebb345769e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-image-service-rhel8@sha256:b7c150e874c43418d35091154f768906eb0ad8dd3ed509465922c6ebb345769e?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:520fd8238e60409bac8656b1b145ac5c91d20592965dbebdf8563a5129afe4ef_amd64",
"product": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:520fd8238e60409bac8656b1b145ac5c91d20592965dbebdf8563a5129afe4ef_amd64",
"product_id": "multicluster-engine/assisted-installer-agent-rhel8@sha256:520fd8238e60409bac8656b1b145ac5c91d20592965dbebdf8563a5129afe4ef_amd64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:520fd8238e60409bac8656b1b145ac5c91d20592965dbebdf8563a5129afe4ef?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-agent-rhel8\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-rhel8@sha256:be8d9a854480bda62e5aee71c629139ab73560f0b4020c562b9865012202c0ec_amd64",
"product": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:be8d9a854480bda62e5aee71c629139ab73560f0b4020c562b9865012202c0ec_amd64",
"product_id": "multicluster-engine/assisted-installer-rhel8@sha256:be8d9a854480bda62e5aee71c629139ab73560f0b4020c562b9865012202c0ec_amd64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-rhel8@sha256:be8d9a854480bda62e5aee71c629139ab73560f0b4020c562b9865012202c0ec?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:521143779c55b600e9473b24ffb1361672d5d5cbaea2a22a5564645fd3437ec0_amd64",
"product": {
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:521143779c55b600e9473b24ffb1361672d5d5cbaea2a22a5564645fd3437ec0_amd64",
"product_id": "multicluster-engine/assisted-installer-controller-rhel8@sha256:521143779c55b600e9473b24ffb1361672d5d5cbaea2a22a5564645fd3437ec0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-controller-rhel8@sha256:521143779c55b600e9473b24ffb1361672d5d5cbaea2a22a5564645fd3437ec0?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-controller-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:4ccdd963c97fab0d30058433ba1aad54a69dc9965b57f0f117b7885ca495aedd_amd64",
"product": {
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:4ccdd963c97fab0d30058433ba1aad54a69dc9965b57f0f117b7885ca495aedd_amd64",
"product_id": "multicluster-engine/assisted-service-8-rhel8@sha256:4ccdd963c97fab0d30058433ba1aad54a69dc9965b57f0f117b7885ca495aedd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-service-8-rhel8@sha256:4ccdd963c97fab0d30058433ba1aad54a69dc9965b57f0f117b7885ca495aedd?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-service-8-rhel8\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:5c4eac14e5fcdfa079d848501011bcc65a0f5fe056380ab5fa7ae89bac2796ed_amd64",
"product": {
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:5c4eac14e5fcdfa079d848501011bcc65a0f5fe056380ab5fa7ae89bac2796ed_amd64",
"product_id": "multicluster-engine/assisted-service-9-rhel9@sha256:5c4eac14e5fcdfa079d848501011bcc65a0f5fe056380ab5fa7ae89bac2796ed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-service-9-rhel9@sha256:5c4eac14e5fcdfa079d848501011bcc65a0f5fe056380ab5fa7ae89bac2796ed?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-service-9-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-rhel9@sha256:b71c59c917a854558b6a6066c81618d0c9cc245dd1e1ca68191de4c14675d1bc_amd64",
"product": {
"name": "multicluster-engine/cluster-api-rhel9@sha256:b71c59c917a854558b6a6066c81618d0c9cc245dd1e1ca68191de4c14675d1bc_amd64",
"product_id": "multicluster-engine/cluster-api-rhel9@sha256:b71c59c917a854558b6a6066c81618d0c9cc245dd1e1ca68191de4c14675d1bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-rhel9@sha256:b71c59c917a854558b6a6066c81618d0c9cc245dd1e1ca68191de4c14675d1bc?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"product": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"product_id": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"product": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a4682fed175f2a6eb0d6b75e2b1075358e814bb85b0a1d2ca71e253bf33c1f2b_amd64",
"product": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a4682fed175f2a6eb0d6b75e2b1075358e814bb85b0a1d2ca71e253bf33c1f2b_amd64",
"product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a4682fed175f2a6eb0d6b75e2b1075358e814bb85b0a1d2ca71e253bf33c1f2b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel9@sha256:a4682fed175f2a6eb0d6b75e2b1075358e814bb85b0a1d2ca71e253bf33c1f2b?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:428934b9a6b8fb2d7143d568ddf4751bd760584e695df9524c3338ac52918b52_amd64",
"product": {
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:428934b9a6b8fb2d7143d568ddf4751bd760584e695df9524c3338ac52918b52_amd64",
"product_id": "multicluster-engine/clusterclaims-controller-rhel9@sha256:428934b9a6b8fb2d7143d568ddf4751bd760584e695df9524c3338ac52918b52_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel9@sha256:428934b9a6b8fb2d7143d568ddf4751bd760584e695df9524c3338ac52918b52?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:98251b6070dc37425d775e22b7a22c7e51bb2d75d85f2ae1d4356c307b156748_amd64",
"product": {
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:98251b6070dc37425d775e22b7a22c7e51bb2d75d85f2ae1d4356c307b156748_amd64",
"product_id": "multicluster-engine/cluster-curator-controller-rhel9@sha256:98251b6070dc37425d775e22b7a22c7e51bb2d75d85f2ae1d4356c307b156748_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel9@sha256:98251b6070dc37425d775e22b7a22c7e51bb2d75d85f2ae1d4356c307b156748?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:03a1057b48a105964e3cd49b43e21b9e39717c618d031dfd4bd9e359e086d29c_amd64",
"product": {
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:03a1057b48a105964e3cd49b43e21b9e39717c618d031dfd4bd9e359e086d29c_amd64",
"product_id": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:03a1057b48a105964e3cd49b43e21b9e39717c618d031dfd4bd9e359e086d29c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel9@sha256:03a1057b48a105964e3cd49b43e21b9e39717c618d031dfd4bd9e359e086d29c?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:5942bb085d89cb610ee023bbefe22ee375105a282d8b505d3f050bb5ce13c076_amd64",
"product": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:5942bb085d89cb610ee023bbefe22ee375105a282d8b505d3f050bb5ce13c076_amd64",
"product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:5942bb085d89cb610ee023bbefe22ee375105a282d8b505d3f050bb5ce13c076_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel9@sha256:5942bb085d89cb610ee023bbefe22ee375105a282d8b505d3f050bb5ce13c076?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:8049c3dcc7a3108c4be57168b215d2a837fd2ac13e97e04f005280aa45a3aa55_amd64",
"product": {
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:8049c3dcc7a3108c4be57168b215d2a837fd2ac13e97e04f005280aa45a3aa55_amd64",
"product_id": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:8049c3dcc7a3108c4be57168b215d2a837fd2ac13e97e04f005280aa45a3aa55_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel9@sha256:8049c3dcc7a3108c4be57168b215d2a837fd2ac13e97e04f005280aa45a3aa55?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:ebd96dc01ab5c758a12084730ab144425d2d76f24dcd4bd8ac41f6052488398f_amd64",
"product": {
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:ebd96dc01ab5c758a12084730ab144425d2d76f24dcd4bd8ac41f6052488398f_amd64",
"product_id": "multicluster-engine/cluster-proxy-rhel9@sha256:ebd96dc01ab5c758a12084730ab144425d2d76f24dcd4bd8ac41f6052488398f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel9@sha256:ebd96dc01ab5c758a12084730ab144425d2d76f24dcd4bd8ac41f6052488398f?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"product": {
"name": "multicluster-engine/console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"product_id": "multicluster-engine/console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"product": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"product_id": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/discovery-rhel9@sha256:c4d7943c78a426f6284af594952bb007b6dcb00eeb8aa00908d1a0da8688aa4d_amd64",
"product": {
"name": "multicluster-engine/discovery-rhel9@sha256:c4d7943c78a426f6284af594952bb007b6dcb00eeb8aa00908d1a0da8688aa4d_amd64",
"product_id": "multicluster-engine/discovery-rhel9@sha256:c4d7943c78a426f6284af594952bb007b6dcb00eeb8aa00908d1a0da8688aa4d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel9@sha256:c4d7943c78a426f6284af594952bb007b6dcb00eeb8aa00908d1a0da8688aa4d?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel9\u0026tag=v2.6.2-9"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hive-rhel9@sha256:7d216b785359d81fedeeb33ebd214837a903ff301d2a4832418fe232f7bc1f21_amd64",
"product": {
"name": "multicluster-engine/hive-rhel9@sha256:7d216b785359d81fedeeb33ebd214837a903ff301d2a4832418fe232f7bc1f21_amd64",
"product_id": "multicluster-engine/hive-rhel9@sha256:7d216b785359d81fedeeb33ebd214837a903ff301d2a4832418fe232f7bc1f21_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel9@sha256:7d216b785359d81fedeeb33ebd214837a903ff301d2a4832418fe232f7bc1f21?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"product": {
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"product_id": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"product": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:62da20be3123fa6d814e7b7949751673559f87a951e89d2fcc408ceb50a8f52f_amd64",
"product": {
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:62da20be3123fa6d814e7b7949751673559f87a951e89d2fcc408ceb50a8f52f_amd64",
"product_id": "multicluster-engine/hypershift-cli-rhel9@sha256:62da20be3123fa6d814e7b7949751673559f87a951e89d2fcc408ceb50a8f52f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel9@sha256:62da20be3123fa6d814e7b7949751673559f87a951e89d2fcc408ceb50a8f52f?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-cli-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:d8ae1b34eff5e87770c42de001a5dfbeca526250d82a49acb6a6c2d014015422_amd64",
"product": {
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:d8ae1b34eff5e87770c42de001a5dfbeca526250d82a49acb6a6c2d014015422_amd64",
"product_id": "multicluster-engine/hypershift-rhel9-operator@sha256:d8ae1b34eff5e87770c42de001a5dfbeca526250d82a49acb6a6c2d014015422_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel9-operator@sha256:d8ae1b34eff5e87770c42de001a5dfbeca526250d82a49acb6a6c2d014015422?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel9-operator\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/image-based-install-rhel9@sha256:ce98b1afd8165d9f99e6d0bb542f4d84e5cbe3db242cea9dff09137274050ad9_amd64",
"product": {
"name": "multicluster-engine/image-based-install-rhel9@sha256:ce98b1afd8165d9f99e6d0bb542f4d84e5cbe3db242cea9dff09137274050ad9_amd64",
"product_id": "multicluster-engine/image-based-install-rhel9@sha256:ce98b1afd8165d9f99e6d0bb542f4d84e5cbe3db242cea9dff09137274050ad9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/image-based-install-rhel9@sha256:ce98b1afd8165d9f99e6d0bb542f4d84e5cbe3db242cea9dff09137274050ad9?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/image-based-install-rhel9\u0026tag=v2.6.2-22"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:061a7f9082146c8d30352986d83af4b18549f2a0447719e943b0f69fc20465a7_amd64",
"product": {
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:061a7f9082146c8d30352986d83af4b18549f2a0447719e943b0f69fc20465a7_amd64",
"product_id": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:061a7f9082146c8d30352986d83af4b18549f2a0447719e943b0f69fc20465a7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-mce-rhel9@sha256:061a7f9082146c8d30352986d83af4b18549f2a0447719e943b0f69fc20465a7?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:64c65223d68e5470d9f94bba18986d6db4476ce58a12043a1c38b6fc57374bc4_amd64",
"product": {
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:64c65223d68e5470d9f94bba18986d6db4476ce58a12043a1c38b6fc57374bc4_amd64",
"product_id": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:64c65223d68e5470d9f94bba18986d6db4476ce58a12043a1c38b6fc57374bc4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel9@sha256:64c65223d68e5470d9f94bba18986d6db4476ce58a12043a1c38b6fc57374bc4?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"product": {
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"product_id": "multicluster-engine/managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"product": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:a1a144538acd889a3a6382068b19e5ee8293294a8725f7c9e7918187ecdd282e_amd64",
"product": {
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:a1a144538acd889a3a6382068b19e5ee8293294a8725f7c9e7918187ecdd282e_amd64",
"product_id": "multicluster-engine/multicloud-manager-rhel9@sha256:a1a144538acd889a3a6382068b19e5ee8293294a8725f7c9e7918187ecdd282e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel9@sha256:a1a144538acd889a3a6382068b19e5ee8293294a8725f7c9e7918187ecdd282e?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/must-gather-rhel9@sha256:530552bc7040af67f67af2828250a4ebabb6d9d528935c778b1d78c1dba817eb_amd64",
"product": {
"name": "multicluster-engine/must-gather-rhel9@sha256:530552bc7040af67f67af2828250a4ebabb6d9d528935c778b1d78c1dba817eb_amd64",
"product_id": "multicluster-engine/must-gather-rhel9@sha256:530552bc7040af67f67af2828250a4ebabb6d9d528935c778b1d78c1dba817eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256:530552bc7040af67f67af2828250a4ebabb6d9d528935c778b1d78c1dba817eb?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/mce-operator-bundle@sha256:4385a988f9cee63ff4df54d70347f4509acaf4d8e6fb6c7d7d7b58c634aec3f7_amd64",
"product": {
"name": "multicluster-engine/mce-operator-bundle@sha256:4385a988f9cee63ff4df54d70347f4509acaf4d8e6fb6c7d7d7b58c634aec3f7_amd64",
"product_id": "multicluster-engine/mce-operator-bundle@sha256:4385a988f9cee63ff4df54d70347f4509acaf4d8e6fb6c7d7d7b58c634aec3f7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mce-operator-bundle@sha256:4385a988f9cee63ff4df54d70347f4509acaf4d8e6fb6c7d7d7b58c634aec3f7?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.6.2-13"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/backplane-rhel9-operator@sha256:c534370c7eaea7c3c99eb6efb10e3e35e0f563bb1e822a8ad9001edf9f4d699b_amd64",
"product": {
"name": "multicluster-engine/backplane-rhel9-operator@sha256:c534370c7eaea7c3c99eb6efb10e3e35e0f563bb1e822a8ad9001edf9f4d699b_amd64",
"product_id": "multicluster-engine/backplane-rhel9-operator@sha256:c534370c7eaea7c3c99eb6efb10e3e35e0f563bb1e822a8ad9001edf9f4d699b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel9-operator@sha256:c534370c7eaea7c3c99eb6efb10e3e35e0f563bb1e822a8ad9001edf9f4d699b?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel9-operator\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/placement-rhel9@sha256:32a74c4daafbc2812c146bd4cf8bb91a6e2751156b14dfbd00fcb0eab0d12d93_amd64",
"product": {
"name": "multicluster-engine/placement-rhel9@sha256:32a74c4daafbc2812c146bd4cf8bb91a6e2751156b14dfbd00fcb0eab0d12d93_amd64",
"product_id": "multicluster-engine/placement-rhel9@sha256:32a74c4daafbc2812c146bd4cf8bb91a6e2751156b14dfbd00fcb0eab0d12d93_amd64",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel9@sha256:32a74c4daafbc2812c146bd4cf8bb91a6e2751156b14dfbd00fcb0eab0d12d93?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:38af12a197029fa68baf34a6dc31dd1ed009b7257c547d582ad2ccc7d90bec5f_amd64",
"product": {
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:38af12a197029fa68baf34a6dc31dd1ed009b7257c547d582ad2ccc7d90bec5f_amd64",
"product_id": "multicluster-engine/provider-credential-controller-rhel9@sha256:38af12a197029fa68baf34a6dc31dd1ed009b7257c547d582ad2ccc7d90bec5f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel9@sha256:38af12a197029fa68baf34a6dc31dd1ed009b7257c547d582ad2ccc7d90bec5f?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-rhel9@sha256:aec214dbc01379ca8a14b1babdd209ce179da949ca95e4628be3480f4c422b78_amd64",
"product": {
"name": "multicluster-engine/registration-rhel9@sha256:aec214dbc01379ca8a14b1babdd209ce179da949ca95e4628be3480f4c422b78_amd64",
"product_id": "multicluster-engine/registration-rhel9@sha256:aec214dbc01379ca8a14b1babdd209ce179da949ca95e4628be3480f4c422b78_amd64",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel9@sha256:aec214dbc01379ca8a14b1babdd209ce179da949ca95e4628be3480f4c422b78?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-operator-rhel9@sha256:16712e3f1fc76fd958a8de9ac5c52c12d850d3632e2bd3f14c627c39972e6902_amd64",
"product": {
"name": "multicluster-engine/registration-operator-rhel9@sha256:16712e3f1fc76fd958a8de9ac5c52c12d850d3632e2bd3f14c627c39972e6902_amd64",
"product_id": "multicluster-engine/registration-operator-rhel9@sha256:16712e3f1fc76fd958a8de9ac5c52c12d850d3632e2bd3f14c627c39972e6902_amd64",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel9@sha256:16712e3f1fc76fd958a8de9ac5c52c12d850d3632e2bd3f14c627c39972e6902?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/work-rhel9@sha256:74ee51bbdfb3e06072ddba3d2d6f8afb9e07562660a7f97dca48627738402440_amd64",
"product": {
"name": "multicluster-engine/work-rhel9@sha256:74ee51bbdfb3e06072ddba3d2d6f8afb9e07562660a7f97dca48627738402440_amd64",
"product_id": "multicluster-engine/work-rhel9@sha256:74ee51bbdfb3e06072ddba3d2d6f8afb9e07562660a7f97dca48627738402440_amd64",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel9@sha256:74ee51bbdfb3e06072ddba3d2d6f8afb9e07562660a7f97dca48627738402440?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel9\u0026tag=v2.6.2-7"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "multicluster-engine/addon-manager-rhel9@sha256:ed2070762f058659c7c57b96aca27ab0929dadb992c1478a4fe40f2cc46056eb_s390x",
"product": {
"name": "multicluster-engine/addon-manager-rhel9@sha256:ed2070762f058659c7c57b96aca27ab0929dadb992c1478a4fe40f2cc46056eb_s390x",
"product_id": "multicluster-engine/addon-manager-rhel9@sha256:ed2070762f058659c7c57b96aca27ab0929dadb992c1478a4fe40f2cc46056eb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/addon-manager-rhel9@sha256:ed2070762f058659c7c57b96aca27ab0929dadb992c1478a4fe40f2cc46056eb?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/addon-manager-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:e45632049ee5e501773b03c3beaed3acc0e5d7345f8d816bbaa90192b12df724_s390x",
"product": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:e45632049ee5e501773b03c3beaed3acc0e5d7345f8d816bbaa90192b12df724_s390x",
"product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:e45632049ee5e501773b03c3beaed3acc0e5d7345f8d816bbaa90192b12df724_s390x",
"product_identification_helper": {
"purl": "pkg:oci/assisted-image-service-rhel8@sha256:e45632049ee5e501773b03c3beaed3acc0e5d7345f8d816bbaa90192b12df724?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:0536793606065e327247ec850df060260246ea101985e62604dd5eb7c41f40b1_s390x",
"product": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:0536793606065e327247ec850df060260246ea101985e62604dd5eb7c41f40b1_s390x",
"product_id": "multicluster-engine/assisted-installer-agent-rhel8@sha256:0536793606065e327247ec850df060260246ea101985e62604dd5eb7c41f40b1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:0536793606065e327247ec850df060260246ea101985e62604dd5eb7c41f40b1?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-agent-rhel8\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-rhel8@sha256:2b6ac6ac869393a975f18d57b8b672ce5fb44227c70a1ee9b4c3e9a45b66cf58_s390x",
"product": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:2b6ac6ac869393a975f18d57b8b672ce5fb44227c70a1ee9b4c3e9a45b66cf58_s390x",
"product_id": "multicluster-engine/assisted-installer-rhel8@sha256:2b6ac6ac869393a975f18d57b8b672ce5fb44227c70a1ee9b4c3e9a45b66cf58_s390x",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-rhel8@sha256:2b6ac6ac869393a975f18d57b8b672ce5fb44227c70a1ee9b4c3e9a45b66cf58?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:737eb30b5ae839e6670cc26303b660b0875ae1eeed6438eae1ff03ed1e011bdb_s390x",
"product": {
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:737eb30b5ae839e6670cc26303b660b0875ae1eeed6438eae1ff03ed1e011bdb_s390x",
"product_id": "multicluster-engine/assisted-installer-controller-rhel8@sha256:737eb30b5ae839e6670cc26303b660b0875ae1eeed6438eae1ff03ed1e011bdb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-controller-rhel8@sha256:737eb30b5ae839e6670cc26303b660b0875ae1eeed6438eae1ff03ed1e011bdb?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-controller-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:bb8ce76de216a8cc25d59bf8e7605efc298f2a198c60324ba17cdf89be20b6c1_s390x",
"product": {
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:bb8ce76de216a8cc25d59bf8e7605efc298f2a198c60324ba17cdf89be20b6c1_s390x",
"product_id": "multicluster-engine/assisted-service-8-rhel8@sha256:bb8ce76de216a8cc25d59bf8e7605efc298f2a198c60324ba17cdf89be20b6c1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/assisted-service-8-rhel8@sha256:bb8ce76de216a8cc25d59bf8e7605efc298f2a198c60324ba17cdf89be20b6c1?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-service-8-rhel8\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:d30f0114dcbcf436bc2063894aeef28767640950fe8836f275f4d15912f22c13_s390x",
"product": {
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:d30f0114dcbcf436bc2063894aeef28767640950fe8836f275f4d15912f22c13_s390x",
"product_id": "multicluster-engine/assisted-service-9-rhel9@sha256:d30f0114dcbcf436bc2063894aeef28767640950fe8836f275f4d15912f22c13_s390x",
"product_identification_helper": {
"purl": "pkg:oci/assisted-service-9-rhel9@sha256:d30f0114dcbcf436bc2063894aeef28767640950fe8836f275f4d15912f22c13?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-service-9-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-rhel9@sha256:e532ea5f84bc7c942b42e2f324fd2bafbcae7f4dc8f0e43d83741b36f5291a95_s390x",
"product": {
"name": "multicluster-engine/cluster-api-rhel9@sha256:e532ea5f84bc7c942b42e2f324fd2bafbcae7f4dc8f0e43d83741b36f5291a95_s390x",
"product_id": "multicluster-engine/cluster-api-rhel9@sha256:e532ea5f84bc7c942b42e2f324fd2bafbcae7f4dc8f0e43d83741b36f5291a95_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-rhel9@sha256:e532ea5f84bc7c942b42e2f324fd2bafbcae7f4dc8f0e43d83741b36f5291a95?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"product": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"product_id": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"product": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9996d77e31cf4adf708c6866c2a3079e623c11539cdc26e05100898faadca31d_s390x",
"product": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9996d77e31cf4adf708c6866c2a3079e623c11539cdc26e05100898faadca31d_s390x",
"product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9996d77e31cf4adf708c6866c2a3079e623c11539cdc26e05100898faadca31d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel9@sha256:9996d77e31cf4adf708c6866c2a3079e623c11539cdc26e05100898faadca31d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:03239302e7484ae4e7e915b2d2328e3eaed6ea9384486913f923b37eaabe8dd3_s390x",
"product": {
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:03239302e7484ae4e7e915b2d2328e3eaed6ea9384486913f923b37eaabe8dd3_s390x",
"product_id": "multicluster-engine/clusterclaims-controller-rhel9@sha256:03239302e7484ae4e7e915b2d2328e3eaed6ea9384486913f923b37eaabe8dd3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel9@sha256:03239302e7484ae4e7e915b2d2328e3eaed6ea9384486913f923b37eaabe8dd3?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:7f53a3c60934312374ad2914ffba757ed5d0e869b4fb0502c75db9249593744e_s390x",
"product": {
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:7f53a3c60934312374ad2914ffba757ed5d0e869b4fb0502c75db9249593744e_s390x",
"product_id": "multicluster-engine/cluster-curator-controller-rhel9@sha256:7f53a3c60934312374ad2914ffba757ed5d0e869b4fb0502c75db9249593744e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel9@sha256:7f53a3c60934312374ad2914ffba757ed5d0e869b4fb0502c75db9249593744e?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:6749e9748039c24278b1e49914be37b9f0eb0a231e25bf2943eaf5837a5fdbb0_s390x",
"product": {
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:6749e9748039c24278b1e49914be37b9f0eb0a231e25bf2943eaf5837a5fdbb0_s390x",
"product_id": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:6749e9748039c24278b1e49914be37b9f0eb0a231e25bf2943eaf5837a5fdbb0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel9@sha256:6749e9748039c24278b1e49914be37b9f0eb0a231e25bf2943eaf5837a5fdbb0?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:dfacaa2c151351ef08bd04fbe231d01d0fe191fab99cfc7994227bd1207b7146_s390x",
"product": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:dfacaa2c151351ef08bd04fbe231d01d0fe191fab99cfc7994227bd1207b7146_s390x",
"product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:dfacaa2c151351ef08bd04fbe231d01d0fe191fab99cfc7994227bd1207b7146_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel9@sha256:dfacaa2c151351ef08bd04fbe231d01d0fe191fab99cfc7994227bd1207b7146?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:7f85ee855ee30ac22a1f1bd3757a2a9dff18a8aa8495810dc6b70b7a00d8d115_s390x",
"product": {
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:7f85ee855ee30ac22a1f1bd3757a2a9dff18a8aa8495810dc6b70b7a00d8d115_s390x",
"product_id": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:7f85ee855ee30ac22a1f1bd3757a2a9dff18a8aa8495810dc6b70b7a00d8d115_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel9@sha256:7f85ee855ee30ac22a1f1bd3757a2a9dff18a8aa8495810dc6b70b7a00d8d115?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:c922b2d36c86fe89e620eb288ce52904d6ff718154fc4ab9f54f117b847967a1_s390x",
"product": {
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:c922b2d36c86fe89e620eb288ce52904d6ff718154fc4ab9f54f117b847967a1_s390x",
"product_id": "multicluster-engine/cluster-proxy-rhel9@sha256:c922b2d36c86fe89e620eb288ce52904d6ff718154fc4ab9f54f117b847967a1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel9@sha256:c922b2d36c86fe89e620eb288ce52904d6ff718154fc4ab9f54f117b847967a1?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"product": {
"name": "multicluster-engine/console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"product_id": "multicluster-engine/console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"product": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"product_id": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/discovery-rhel9@sha256:86039c1c04b1b2424d02b6a80890d0d5559a0d2821ea03441676e069fcd1d242_s390x",
"product": {
"name": "multicluster-engine/discovery-rhel9@sha256:86039c1c04b1b2424d02b6a80890d0d5559a0d2821ea03441676e069fcd1d242_s390x",
"product_id": "multicluster-engine/discovery-rhel9@sha256:86039c1c04b1b2424d02b6a80890d0d5559a0d2821ea03441676e069fcd1d242_s390x",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel9@sha256:86039c1c04b1b2424d02b6a80890d0d5559a0d2821ea03441676e069fcd1d242?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel9\u0026tag=v2.6.2-9"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hive-rhel9@sha256:6b3933d68a7089d5f82a4c7a4223ce895ffddd8b38565a7fc9a9efc41e43fed1_s390x",
"product": {
"name": "multicluster-engine/hive-rhel9@sha256:6b3933d68a7089d5f82a4c7a4223ce895ffddd8b38565a7fc9a9efc41e43fed1_s390x",
"product_id": "multicluster-engine/hive-rhel9@sha256:6b3933d68a7089d5f82a4c7a4223ce895ffddd8b38565a7fc9a9efc41e43fed1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel9@sha256:6b3933d68a7089d5f82a4c7a4223ce895ffddd8b38565a7fc9a9efc41e43fed1?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"product": {
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"product_id": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"product": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:b3663745add6e398f05c0328d430b5d4b0b7596fe7ad9dc66ad9120fb915e071_s390x",
"product": {
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:b3663745add6e398f05c0328d430b5d4b0b7596fe7ad9dc66ad9120fb915e071_s390x",
"product_id": "multicluster-engine/hypershift-cli-rhel9@sha256:b3663745add6e398f05c0328d430b5d4b0b7596fe7ad9dc66ad9120fb915e071_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel9@sha256:b3663745add6e398f05c0328d430b5d4b0b7596fe7ad9dc66ad9120fb915e071?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-cli-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:e9e6736a93698c80fee0bf0338d5305d2154b1edf668d6a2dc88345aa91c5047_s390x",
"product": {
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:e9e6736a93698c80fee0bf0338d5305d2154b1edf668d6a2dc88345aa91c5047_s390x",
"product_id": "multicluster-engine/hypershift-rhel9-operator@sha256:e9e6736a93698c80fee0bf0338d5305d2154b1edf668d6a2dc88345aa91c5047_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel9-operator@sha256:e9e6736a93698c80fee0bf0338d5305d2154b1edf668d6a2dc88345aa91c5047?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel9-operator\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/image-based-install-rhel9@sha256:c27f1f2e7aad3896ecce8b9bd2824ca06b83f5f5fd7b4406b2f6d1487b9da353_s390x",
"product": {
"name": "multicluster-engine/image-based-install-rhel9@sha256:c27f1f2e7aad3896ecce8b9bd2824ca06b83f5f5fd7b4406b2f6d1487b9da353_s390x",
"product_id": "multicluster-engine/image-based-install-rhel9@sha256:c27f1f2e7aad3896ecce8b9bd2824ca06b83f5f5fd7b4406b2f6d1487b9da353_s390x",
"product_identification_helper": {
"purl": "pkg:oci/image-based-install-rhel9@sha256:c27f1f2e7aad3896ecce8b9bd2824ca06b83f5f5fd7b4406b2f6d1487b9da353?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/image-based-install-rhel9\u0026tag=v2.6.2-22"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:b110cc312114fcae5d85daa3671266c192f6315c3beaf3aafa8b16ae85ae6e8e_s390x",
"product": {
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:b110cc312114fcae5d85daa3671266c192f6315c3beaf3aafa8b16ae85ae6e8e_s390x",
"product_id": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:b110cc312114fcae5d85daa3671266c192f6315c3beaf3aafa8b16ae85ae6e8e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-mce-rhel9@sha256:b110cc312114fcae5d85daa3671266c192f6315c3beaf3aafa8b16ae85ae6e8e?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:fa420b9f08b8a8828a6625f53427690e1cab646088639b9f5f60b8f44623e723_s390x",
"product": {
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:fa420b9f08b8a8828a6625f53427690e1cab646088639b9f5f60b8f44623e723_s390x",
"product_id": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:fa420b9f08b8a8828a6625f53427690e1cab646088639b9f5f60b8f44623e723_s390x",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel9@sha256:fa420b9f08b8a8828a6625f53427690e1cab646088639b9f5f60b8f44623e723?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"product": {
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"product_id": "multicluster-engine/managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"product": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:291cca7f9fb3ca1d0e353db4ff1478d598ee7ef3a24ada16be64c96482267e60_s390x",
"product": {
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:291cca7f9fb3ca1d0e353db4ff1478d598ee7ef3a24ada16be64c96482267e60_s390x",
"product_id": "multicluster-engine/multicloud-manager-rhel9@sha256:291cca7f9fb3ca1d0e353db4ff1478d598ee7ef3a24ada16be64c96482267e60_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel9@sha256:291cca7f9fb3ca1d0e353db4ff1478d598ee7ef3a24ada16be64c96482267e60?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/must-gather-rhel9@sha256:e65dc6c5996a11b328cc4950b821e4a00b2e3cf504e767992eca097bd0387f03_s390x",
"product": {
"name": "multicluster-engine/must-gather-rhel9@sha256:e65dc6c5996a11b328cc4950b821e4a00b2e3cf504e767992eca097bd0387f03_s390x",
"product_id": "multicluster-engine/must-gather-rhel9@sha256:e65dc6c5996a11b328cc4950b821e4a00b2e3cf504e767992eca097bd0387f03_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256:e65dc6c5996a11b328cc4950b821e4a00b2e3cf504e767992eca097bd0387f03?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/mce-operator-bundle@sha256:2359ffdb8fdad57598a8405c3156f51f6e13898c137c2c26f8257fd112ed808f_s390x",
"product": {
"name": "multicluster-engine/mce-operator-bundle@sha256:2359ffdb8fdad57598a8405c3156f51f6e13898c137c2c26f8257fd112ed808f_s390x",
"product_id": "multicluster-engine/mce-operator-bundle@sha256:2359ffdb8fdad57598a8405c3156f51f6e13898c137c2c26f8257fd112ed808f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mce-operator-bundle@sha256:2359ffdb8fdad57598a8405c3156f51f6e13898c137c2c26f8257fd112ed808f?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.6.2-13"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/backplane-rhel9-operator@sha256:11d7fa3b841b8af36bfb59039d663f21523268ae53e3727aedb3b731e2e8007b_s390x",
"product": {
"name": "multicluster-engine/backplane-rhel9-operator@sha256:11d7fa3b841b8af36bfb59039d663f21523268ae53e3727aedb3b731e2e8007b_s390x",
"product_id": "multicluster-engine/backplane-rhel9-operator@sha256:11d7fa3b841b8af36bfb59039d663f21523268ae53e3727aedb3b731e2e8007b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel9-operator@sha256:11d7fa3b841b8af36bfb59039d663f21523268ae53e3727aedb3b731e2e8007b?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel9-operator\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/placement-rhel9@sha256:18dbe0d0c1e4be68c26db5ef17a2f11ebfceeda7077d0834426d62fcb0d0b703_s390x",
"product": {
"name": "multicluster-engine/placement-rhel9@sha256:18dbe0d0c1e4be68c26db5ef17a2f11ebfceeda7077d0834426d62fcb0d0b703_s390x",
"product_id": "multicluster-engine/placement-rhel9@sha256:18dbe0d0c1e4be68c26db5ef17a2f11ebfceeda7077d0834426d62fcb0d0b703_s390x",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel9@sha256:18dbe0d0c1e4be68c26db5ef17a2f11ebfceeda7077d0834426d62fcb0d0b703?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:2be3dec184056c3f466456febc08b8ae8036814a33ce12aedeb32ff71d5cbab6_s390x",
"product": {
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:2be3dec184056c3f466456febc08b8ae8036814a33ce12aedeb32ff71d5cbab6_s390x",
"product_id": "multicluster-engine/provider-credential-controller-rhel9@sha256:2be3dec184056c3f466456febc08b8ae8036814a33ce12aedeb32ff71d5cbab6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel9@sha256:2be3dec184056c3f466456febc08b8ae8036814a33ce12aedeb32ff71d5cbab6?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-rhel9@sha256:2c810af89c2198900c1605b1a02ab7870d6b8811e56b235d84628dacc6c45e15_s390x",
"product": {
"name": "multicluster-engine/registration-rhel9@sha256:2c810af89c2198900c1605b1a02ab7870d6b8811e56b235d84628dacc6c45e15_s390x",
"product_id": "multicluster-engine/registration-rhel9@sha256:2c810af89c2198900c1605b1a02ab7870d6b8811e56b235d84628dacc6c45e15_s390x",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel9@sha256:2c810af89c2198900c1605b1a02ab7870d6b8811e56b235d84628dacc6c45e15?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-operator-rhel9@sha256:013fdab49e3bf2a1130865cce36af33d090c8874338f17c529a7581226c34900_s390x",
"product": {
"name": "multicluster-engine/registration-operator-rhel9@sha256:013fdab49e3bf2a1130865cce36af33d090c8874338f17c529a7581226c34900_s390x",
"product_id": "multicluster-engine/registration-operator-rhel9@sha256:013fdab49e3bf2a1130865cce36af33d090c8874338f17c529a7581226c34900_s390x",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel9@sha256:013fdab49e3bf2a1130865cce36af33d090c8874338f17c529a7581226c34900?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/work-rhel9@sha256:dd0c26976b4ed86d8b14aa0bf10aa56a484c38af721803e99248bbed85173b65_s390x",
"product": {
"name": "multicluster-engine/work-rhel9@sha256:dd0c26976b4ed86d8b14aa0bf10aa56a484c38af721803e99248bbed85173b65_s390x",
"product_id": "multicluster-engine/work-rhel9@sha256:dd0c26976b4ed86d8b14aa0bf10aa56a484c38af721803e99248bbed85173b65_s390x",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel9@sha256:dd0c26976b4ed86d8b14aa0bf10aa56a484c38af721803e99248bbed85173b65?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel9\u0026tag=v2.6.2-7"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "multicluster-engine/addon-manager-rhel9@sha256:28bc6bf67308e3a9d672602b2c01767c80f6b821c458c2d3d933869741ac879d_arm64",
"product": {
"name": "multicluster-engine/addon-manager-rhel9@sha256:28bc6bf67308e3a9d672602b2c01767c80f6b821c458c2d3d933869741ac879d_arm64",
"product_id": "multicluster-engine/addon-manager-rhel9@sha256:28bc6bf67308e3a9d672602b2c01767c80f6b821c458c2d3d933869741ac879d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/addon-manager-rhel9@sha256:28bc6bf67308e3a9d672602b2c01767c80f6b821c458c2d3d933869741ac879d?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/addon-manager-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:6c97acea30e0679b19b2d9b43c3a09f72571dfc28e5f736fe0299ab69014a6b4_arm64",
"product": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:6c97acea30e0679b19b2d9b43c3a09f72571dfc28e5f736fe0299ab69014a6b4_arm64",
"product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:6c97acea30e0679b19b2d9b43c3a09f72571dfc28e5f736fe0299ab69014a6b4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-image-service-rhel8@sha256:6c97acea30e0679b19b2d9b43c3a09f72571dfc28e5f736fe0299ab69014a6b4?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:319f7238c812e6ccf020f3b665f88f8236a51ac7740b9d974b50110d7566dcda_arm64",
"product": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:319f7238c812e6ccf020f3b665f88f8236a51ac7740b9d974b50110d7566dcda_arm64",
"product_id": "multicluster-engine/assisted-installer-agent-rhel8@sha256:319f7238c812e6ccf020f3b665f88f8236a51ac7740b9d974b50110d7566dcda_arm64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:319f7238c812e6ccf020f3b665f88f8236a51ac7740b9d974b50110d7566dcda?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-agent-rhel8\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-rhel8@sha256:e7a270f405cbfe594680d7103b8a59b1de442e65fc6c70590b735b0acd24edc0_arm64",
"product": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:e7a270f405cbfe594680d7103b8a59b1de442e65fc6c70590b735b0acd24edc0_arm64",
"product_id": "multicluster-engine/assisted-installer-rhel8@sha256:e7a270f405cbfe594680d7103b8a59b1de442e65fc6c70590b735b0acd24edc0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-rhel8@sha256:e7a270f405cbfe594680d7103b8a59b1de442e65fc6c70590b735b0acd24edc0?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:eb939c5a630413bcf64f633801a65b9c921f4357ac41ddf52492bbb827957c66_arm64",
"product": {
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:eb939c5a630413bcf64f633801a65b9c921f4357ac41ddf52492bbb827957c66_arm64",
"product_id": "multicluster-engine/assisted-installer-controller-rhel8@sha256:eb939c5a630413bcf64f633801a65b9c921f4357ac41ddf52492bbb827957c66_arm64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-installer-controller-rhel8@sha256:eb939c5a630413bcf64f633801a65b9c921f4357ac41ddf52492bbb827957c66?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-controller-rhel8\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:b1aa30670a0169ff6833fdfef04f383177aa19d2805a361d848e5196f2d4dad9_arm64",
"product": {
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:b1aa30670a0169ff6833fdfef04f383177aa19d2805a361d848e5196f2d4dad9_arm64",
"product_id": "multicluster-engine/assisted-service-8-rhel8@sha256:b1aa30670a0169ff6833fdfef04f383177aa19d2805a361d848e5196f2d4dad9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-service-8-rhel8@sha256:b1aa30670a0169ff6833fdfef04f383177aa19d2805a361d848e5196f2d4dad9?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-service-8-rhel8\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:35327c34974a9a064195116403c8c3bf725e0866973c94bf326b73d91d0560c1_arm64",
"product": {
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:35327c34974a9a064195116403c8c3bf725e0866973c94bf326b73d91d0560c1_arm64",
"product_id": "multicluster-engine/assisted-service-9-rhel9@sha256:35327c34974a9a064195116403c8c3bf725e0866973c94bf326b73d91d0560c1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/assisted-service-9-rhel9@sha256:35327c34974a9a064195116403c8c3bf725e0866973c94bf326b73d91d0560c1?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-service-9-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-rhel9@sha256:16d96bcd4510853caf8219c5dda1e69a2bde44fe9d11c954e66e55f6cbb4a78c_arm64",
"product": {
"name": "multicluster-engine/cluster-api-rhel9@sha256:16d96bcd4510853caf8219c5dda1e69a2bde44fe9d11c954e66e55f6cbb4a78c_arm64",
"product_id": "multicluster-engine/cluster-api-rhel9@sha256:16d96bcd4510853caf8219c5dda1e69a2bde44fe9d11c954e66e55f6cbb4a78c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-rhel9@sha256:16d96bcd4510853caf8219c5dda1e69a2bde44fe9d11c954e66e55f6cbb4a78c?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"product": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"product_id": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"product": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:567b55ec3d658b97611c5705b65c8a9a2f291aca755a391941f03fa67c775520_arm64",
"product": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:567b55ec3d658b97611c5705b65c8a9a2f291aca755a391941f03fa67c775520_arm64",
"product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:567b55ec3d658b97611c5705b65c8a9a2f291aca755a391941f03fa67c775520_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel9@sha256:567b55ec3d658b97611c5705b65c8a9a2f291aca755a391941f03fa67c775520?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:fbe0401ee2c60f07f9f3cea7ab5b2563f9035e609c39ae8e6e1e5aa80171ffe6_arm64",
"product": {
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:fbe0401ee2c60f07f9f3cea7ab5b2563f9035e609c39ae8e6e1e5aa80171ffe6_arm64",
"product_id": "multicluster-engine/clusterclaims-controller-rhel9@sha256:fbe0401ee2c60f07f9f3cea7ab5b2563f9035e609c39ae8e6e1e5aa80171ffe6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel9@sha256:fbe0401ee2c60f07f9f3cea7ab5b2563f9035e609c39ae8e6e1e5aa80171ffe6?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:61189c337af540bc0bb10491e66de30fd7efb9b9536268d43aa638aeb96f18c4_arm64",
"product": {
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:61189c337af540bc0bb10491e66de30fd7efb9b9536268d43aa638aeb96f18c4_arm64",
"product_id": "multicluster-engine/cluster-curator-controller-rhel9@sha256:61189c337af540bc0bb10491e66de30fd7efb9b9536268d43aa638aeb96f18c4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel9@sha256:61189c337af540bc0bb10491e66de30fd7efb9b9536268d43aa638aeb96f18c4?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:dd78b0e868c1ec1602d91c95601cbfcd482ced9be766bdf27d58a9d8cf253dda_arm64",
"product": {
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:dd78b0e868c1ec1602d91c95601cbfcd482ced9be766bdf27d58a9d8cf253dda_arm64",
"product_id": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:dd78b0e868c1ec1602d91c95601cbfcd482ced9be766bdf27d58a9d8cf253dda_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel9@sha256:dd78b0e868c1ec1602d91c95601cbfcd482ced9be766bdf27d58a9d8cf253dda?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:efa95a5a96ecb8b47c1f03a0ee59adb19165494fe0c5e7fea7a6c379056f4ead_arm64",
"product": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:efa95a5a96ecb8b47c1f03a0ee59adb19165494fe0c5e7fea7a6c379056f4ead_arm64",
"product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:efa95a5a96ecb8b47c1f03a0ee59adb19165494fe0c5e7fea7a6c379056f4ead_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel9@sha256:efa95a5a96ecb8b47c1f03a0ee59adb19165494fe0c5e7fea7a6c379056f4ead?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:f46d8770dbf1c60fffaddb1630cbd4b3afd4dab9a4bc16c6f814d762ee2f6225_arm64",
"product": {
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:f46d8770dbf1c60fffaddb1630cbd4b3afd4dab9a4bc16c6f814d762ee2f6225_arm64",
"product_id": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:f46d8770dbf1c60fffaddb1630cbd4b3afd4dab9a4bc16c6f814d762ee2f6225_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel9@sha256:f46d8770dbf1c60fffaddb1630cbd4b3afd4dab9a4bc16c6f814d762ee2f6225?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:baf330884101327732eca8f78fc65bae7fb34ac5faba8f93491d42de237a177c_arm64",
"product": {
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:baf330884101327732eca8f78fc65bae7fb34ac5faba8f93491d42de237a177c_arm64",
"product_id": "multicluster-engine/cluster-proxy-rhel9@sha256:baf330884101327732eca8f78fc65bae7fb34ac5faba8f93491d42de237a177c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel9@sha256:baf330884101327732eca8f78fc65bae7fb34ac5faba8f93491d42de237a177c?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"product": {
"name": "multicluster-engine/console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"product_id": "multicluster-engine/console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"product": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"product_id": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/discovery-rhel9@sha256:ea514a667518bc1cc7de8e9b3e34212e3576c6cad82ad36c3704b42c6d40d444_arm64",
"product": {
"name": "multicluster-engine/discovery-rhel9@sha256:ea514a667518bc1cc7de8e9b3e34212e3576c6cad82ad36c3704b42c6d40d444_arm64",
"product_id": "multicluster-engine/discovery-rhel9@sha256:ea514a667518bc1cc7de8e9b3e34212e3576c6cad82ad36c3704b42c6d40d444_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel9@sha256:ea514a667518bc1cc7de8e9b3e34212e3576c6cad82ad36c3704b42c6d40d444?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel9\u0026tag=v2.6.2-9"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hive-rhel9@sha256:fe2040c631ff796b5fc07517a3f2e4cf63e30e6cd170791fda4dc92971efc314_arm64",
"product": {
"name": "multicluster-engine/hive-rhel9@sha256:fe2040c631ff796b5fc07517a3f2e4cf63e30e6cd170791fda4dc92971efc314_arm64",
"product_id": "multicluster-engine/hive-rhel9@sha256:fe2040c631ff796b5fc07517a3f2e4cf63e30e6cd170791fda4dc92971efc314_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel9@sha256:fe2040c631ff796b5fc07517a3f2e4cf63e30e6cd170791fda4dc92971efc314?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"product": {
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"product_id": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"product": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:20a016b283e27f58633ee646c5c6c86feb9ad0f5fb6663de086186400b46621c_arm64",
"product": {
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:20a016b283e27f58633ee646c5c6c86feb9ad0f5fb6663de086186400b46621c_arm64",
"product_id": "multicluster-engine/hypershift-cli-rhel9@sha256:20a016b283e27f58633ee646c5c6c86feb9ad0f5fb6663de086186400b46621c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel9@sha256:20a016b283e27f58633ee646c5c6c86feb9ad0f5fb6663de086186400b46621c?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-cli-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:23d7fdf8d30a2030c78bff04bda2208635a16b00481bb26cfdc270ccc4c0e68b_arm64",
"product": {
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:23d7fdf8d30a2030c78bff04bda2208635a16b00481bb26cfdc270ccc4c0e68b_arm64",
"product_id": "multicluster-engine/hypershift-rhel9-operator@sha256:23d7fdf8d30a2030c78bff04bda2208635a16b00481bb26cfdc270ccc4c0e68b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel9-operator@sha256:23d7fdf8d30a2030c78bff04bda2208635a16b00481bb26cfdc270ccc4c0e68b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel9-operator\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/image-based-install-rhel9@sha256:12d0c8d22b4233e101d40adf4af6a1dd05814d137070b5ffe12644e23975b9ef_arm64",
"product": {
"name": "multicluster-engine/image-based-install-rhel9@sha256:12d0c8d22b4233e101d40adf4af6a1dd05814d137070b5ffe12644e23975b9ef_arm64",
"product_id": "multicluster-engine/image-based-install-rhel9@sha256:12d0c8d22b4233e101d40adf4af6a1dd05814d137070b5ffe12644e23975b9ef_arm64",
"product_identification_helper": {
"purl": "pkg:oci/image-based-install-rhel9@sha256:12d0c8d22b4233e101d40adf4af6a1dd05814d137070b5ffe12644e23975b9ef?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/image-based-install-rhel9\u0026tag=v2.6.2-22"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d4e41b4449e59290dcea64440e49eb09605faf15b3a4d3620591c610fd8cba76_arm64",
"product": {
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d4e41b4449e59290dcea64440e49eb09605faf15b3a4d3620591c610fd8cba76_arm64",
"product_id": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d4e41b4449e59290dcea64440e49eb09605faf15b3a4d3620591c610fd8cba76_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-mce-rhel9@sha256:d4e41b4449e59290dcea64440e49eb09605faf15b3a4d3620591c610fd8cba76?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:71f1703a8394fcf7f957213545130b01a56b06e2aceb3d96852f9dbc0dc0d625_arm64",
"product": {
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:71f1703a8394fcf7f957213545130b01a56b06e2aceb3d96852f9dbc0dc0d625_arm64",
"product_id": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:71f1703a8394fcf7f957213545130b01a56b06e2aceb3d96852f9dbc0dc0d625_arm64",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel9@sha256:71f1703a8394fcf7f957213545130b01a56b06e2aceb3d96852f9dbc0dc0d625?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"product": {
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"product_id": "multicluster-engine/managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"product": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9\u0026tag=v2.6.2-8"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:ccb53707ebf3a8295d4463e430b9fe901736d08105222630da9d415ba0779a76_arm64",
"product": {
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:ccb53707ebf3a8295d4463e430b9fe901736d08105222630da9d415ba0779a76_arm64",
"product_id": "multicluster-engine/multicloud-manager-rhel9@sha256:ccb53707ebf3a8295d4463e430b9fe901736d08105222630da9d415ba0779a76_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel9@sha256:ccb53707ebf3a8295d4463e430b9fe901736d08105222630da9d415ba0779a76?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/must-gather-rhel9@sha256:c8cb84783aad7439fb7ec9fb7118d15fff731e0df42ddd0d6cce9d0300e296f0_arm64",
"product": {
"name": "multicluster-engine/must-gather-rhel9@sha256:c8cb84783aad7439fb7ec9fb7118d15fff731e0df42ddd0d6cce9d0300e296f0_arm64",
"product_id": "multicluster-engine/must-gather-rhel9@sha256:c8cb84783aad7439fb7ec9fb7118d15fff731e0df42ddd0d6cce9d0300e296f0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256:c8cb84783aad7439fb7ec9fb7118d15fff731e0df42ddd0d6cce9d0300e296f0?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel9\u0026tag=v2.6.2-5"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/backplane-rhel9-operator@sha256:c9dc90710afc92487b5b8b5ba9dee955fdf881f11c7df7f8cff2b292bf36a8c9_arm64",
"product": {
"name": "multicluster-engine/backplane-rhel9-operator@sha256:c9dc90710afc92487b5b8b5ba9dee955fdf881f11c7df7f8cff2b292bf36a8c9_arm64",
"product_id": "multicluster-engine/backplane-rhel9-operator@sha256:c9dc90710afc92487b5b8b5ba9dee955fdf881f11c7df7f8cff2b292bf36a8c9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel9-operator@sha256:c9dc90710afc92487b5b8b5ba9dee955fdf881f11c7df7f8cff2b292bf36a8c9?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel9-operator\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/placement-rhel9@sha256:6ec0c37ea9f203f4fb95d2cdcfd7ab447f81f8401cd68531c03bf5d5fb5a5155_arm64",
"product": {
"name": "multicluster-engine/placement-rhel9@sha256:6ec0c37ea9f203f4fb95d2cdcfd7ab447f81f8401cd68531c03bf5d5fb5a5155_arm64",
"product_id": "multicluster-engine/placement-rhel9@sha256:6ec0c37ea9f203f4fb95d2cdcfd7ab447f81f8401cd68531c03bf5d5fb5a5155_arm64",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel9@sha256:6ec0c37ea9f203f4fb95d2cdcfd7ab447f81f8401cd68531c03bf5d5fb5a5155?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel9\u0026tag=v2.6.2-6"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:238ba8b48e163b71b84a6c960188aeff6c42226c176ce01441ff088aa62625bd_arm64",
"product": {
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:238ba8b48e163b71b84a6c960188aeff6c42226c176ce01441ff088aa62625bd_arm64",
"product_id": "multicluster-engine/provider-credential-controller-rhel9@sha256:238ba8b48e163b71b84a6c960188aeff6c42226c176ce01441ff088aa62625bd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel9@sha256:238ba8b48e163b71b84a6c960188aeff6c42226c176ce01441ff088aa62625bd?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-rhel9@sha256:d2069ea2e2e0afe955d179e265b30fe323c160af5354209a41ee78f28e95ecdf_arm64",
"product": {
"name": "multicluster-engine/registration-rhel9@sha256:d2069ea2e2e0afe955d179e265b30fe323c160af5354209a41ee78f28e95ecdf_arm64",
"product_id": "multicluster-engine/registration-rhel9@sha256:d2069ea2e2e0afe955d179e265b30fe323c160af5354209a41ee78f28e95ecdf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel9@sha256:d2069ea2e2e0afe955d179e265b30fe323c160af5354209a41ee78f28e95ecdf?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/registration-operator-rhel9@sha256:743bf65b5a6369b6199e8e04749bbd56d7cdfe86baebb8fa009e78c087c7afba_arm64",
"product": {
"name": "multicluster-engine/registration-operator-rhel9@sha256:743bf65b5a6369b6199e8e04749bbd56d7cdfe86baebb8fa009e78c087c7afba_arm64",
"product_id": "multicluster-engine/registration-operator-rhel9@sha256:743bf65b5a6369b6199e8e04749bbd56d7cdfe86baebb8fa009e78c087c7afba_arm64",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel9@sha256:743bf65b5a6369b6199e8e04749bbd56d7cdfe86baebb8fa009e78c087c7afba?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel9\u0026tag=v2.6.2-7"
}
}
},
{
"category": "product_version",
"name": "multicluster-engine/work-rhel9@sha256:000b11a47509f43f12061ecfc3595830e70d06686bf42b67ea0f3a8a4049ddec_arm64",
"product": {
"name": "multicluster-engine/work-rhel9@sha256:000b11a47509f43f12061ecfc3595830e70d06686bf42b67ea0f3a8a4049ddec_arm64",
"product_id": "multicluster-engine/work-rhel9@sha256:000b11a47509f43f12061ecfc3595830e70d06686bf42b67ea0f3a8a4049ddec_arm64",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel9@sha256:000b11a47509f43f12061ecfc3595830e70d06686bf42b67ea0f3a8a4049ddec?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel9\u0026tag=v2.6.2-7"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:6c97acea30e0679b19b2d9b43c3a09f72571dfc28e5f736fe0299ab69014a6b4_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:6c97acea30e0679b19b2d9b43c3a09f72571dfc28e5f736fe0299ab69014a6b4_arm64"
},
"product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:6c97acea30e0679b19b2d9b43c3a09f72571dfc28e5f736fe0299ab69014a6b4_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:b7c150e874c43418d35091154f768906eb0ad8dd3ed509465922c6ebb345769e_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:b7c150e874c43418d35091154f768906eb0ad8dd3ed509465922c6ebb345769e_amd64"
},
"product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:b7c150e874c43418d35091154f768906eb0ad8dd3ed509465922c6ebb345769e_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:c10d4e4efda73c7c1867a13391e03d408762f1069a0c2a86375d9343b36f5410_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:c10d4e4efda73c7c1867a13391e03d408762f1069a0c2a86375d9343b36f5410_ppc64le"
},
"product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:c10d4e4efda73c7c1867a13391e03d408762f1069a0c2a86375d9343b36f5410_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-image-service-rhel8@sha256:e45632049ee5e501773b03c3beaed3acc0e5d7345f8d816bbaa90192b12df724_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:e45632049ee5e501773b03c3beaed3acc0e5d7345f8d816bbaa90192b12df724_s390x"
},
"product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:e45632049ee5e501773b03c3beaed3acc0e5d7345f8d816bbaa90192b12df724_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:0536793606065e327247ec850df060260246ea101985e62604dd5eb7c41f40b1_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:0536793606065e327247ec850df060260246ea101985e62604dd5eb7c41f40b1_s390x"
},
"product_reference": "multicluster-engine/assisted-installer-agent-rhel8@sha256:0536793606065e327247ec850df060260246ea101985e62604dd5eb7c41f40b1_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:319f7238c812e6ccf020f3b665f88f8236a51ac7740b9d974b50110d7566dcda_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:319f7238c812e6ccf020f3b665f88f8236a51ac7740b9d974b50110d7566dcda_arm64"
},
"product_reference": "multicluster-engine/assisted-installer-agent-rhel8@sha256:319f7238c812e6ccf020f3b665f88f8236a51ac7740b9d974b50110d7566dcda_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:520fd8238e60409bac8656b1b145ac5c91d20592965dbebdf8563a5129afe4ef_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:520fd8238e60409bac8656b1b145ac5c91d20592965dbebdf8563a5129afe4ef_amd64"
},
"product_reference": "multicluster-engine/assisted-installer-agent-rhel8@sha256:520fd8238e60409bac8656b1b145ac5c91d20592965dbebdf8563a5129afe4ef_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:ab2d453fc966ddbc6a1a5012b5f70e4be84cd1de739c8b6789ff58288042daec_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:ab2d453fc966ddbc6a1a5012b5f70e4be84cd1de739c8b6789ff58288042daec_ppc64le"
},
"product_reference": "multicluster-engine/assisted-installer-agent-rhel8@sha256:ab2d453fc966ddbc6a1a5012b5f70e4be84cd1de739c8b6789ff58288042daec_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:3ae4da39ce451793b88d2aaf68a963273642ca967189e477820ac4bf3db3718d_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:3ae4da39ce451793b88d2aaf68a963273642ca967189e477820ac4bf3db3718d_ppc64le"
},
"product_reference": "multicluster-engine/assisted-installer-controller-rhel8@sha256:3ae4da39ce451793b88d2aaf68a963273642ca967189e477820ac4bf3db3718d_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:521143779c55b600e9473b24ffb1361672d5d5cbaea2a22a5564645fd3437ec0_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:521143779c55b600e9473b24ffb1361672d5d5cbaea2a22a5564645fd3437ec0_amd64"
},
"product_reference": "multicluster-engine/assisted-installer-controller-rhel8@sha256:521143779c55b600e9473b24ffb1361672d5d5cbaea2a22a5564645fd3437ec0_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:737eb30b5ae839e6670cc26303b660b0875ae1eeed6438eae1ff03ed1e011bdb_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:737eb30b5ae839e6670cc26303b660b0875ae1eeed6438eae1ff03ed1e011bdb_s390x"
},
"product_reference": "multicluster-engine/assisted-installer-controller-rhel8@sha256:737eb30b5ae839e6670cc26303b660b0875ae1eeed6438eae1ff03ed1e011bdb_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-controller-rhel8@sha256:eb939c5a630413bcf64f633801a65b9c921f4357ac41ddf52492bbb827957c66_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:eb939c5a630413bcf64f633801a65b9c921f4357ac41ddf52492bbb827957c66_arm64"
},
"product_reference": "multicluster-engine/assisted-installer-controller-rhel8@sha256:eb939c5a630413bcf64f633801a65b9c921f4357ac41ddf52492bbb827957c66_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:2b6ac6ac869393a975f18d57b8b672ce5fb44227c70a1ee9b4c3e9a45b66cf58_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:2b6ac6ac869393a975f18d57b8b672ce5fb44227c70a1ee9b4c3e9a45b66cf58_s390x"
},
"product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:2b6ac6ac869393a975f18d57b8b672ce5fb44227c70a1ee9b4c3e9a45b66cf58_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:3d7e94bcd1ea27ebb3c786053a53ff6c5b280b666996378f446ef3b5a045b09f_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:3d7e94bcd1ea27ebb3c786053a53ff6c5b280b666996378f446ef3b5a045b09f_ppc64le"
},
"product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:3d7e94bcd1ea27ebb3c786053a53ff6c5b280b666996378f446ef3b5a045b09f_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:be8d9a854480bda62e5aee71c629139ab73560f0b4020c562b9865012202c0ec_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:be8d9a854480bda62e5aee71c629139ab73560f0b4020c562b9865012202c0ec_amd64"
},
"product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:be8d9a854480bda62e5aee71c629139ab73560f0b4020c562b9865012202c0ec_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-installer-rhel8@sha256:e7a270f405cbfe594680d7103b8a59b1de442e65fc6c70590b735b0acd24edc0_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:e7a270f405cbfe594680d7103b8a59b1de442e65fc6c70590b735b0acd24edc0_arm64"
},
"product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:e7a270f405cbfe594680d7103b8a59b1de442e65fc6c70590b735b0acd24edc0_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:4ccdd963c97fab0d30058433ba1aad54a69dc9965b57f0f117b7885ca495aedd_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:4ccdd963c97fab0d30058433ba1aad54a69dc9965b57f0f117b7885ca495aedd_amd64"
},
"product_reference": "multicluster-engine/assisted-service-8-rhel8@sha256:4ccdd963c97fab0d30058433ba1aad54a69dc9965b57f0f117b7885ca495aedd_amd64",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:b1aa30670a0169ff6833fdfef04f383177aa19d2805a361d848e5196f2d4dad9_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:b1aa30670a0169ff6833fdfef04f383177aa19d2805a361d848e5196f2d4dad9_arm64"
},
"product_reference": "multicluster-engine/assisted-service-8-rhel8@sha256:b1aa30670a0169ff6833fdfef04f383177aa19d2805a361d848e5196f2d4dad9_arm64",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:bb8ce76de216a8cc25d59bf8e7605efc298f2a198c60324ba17cdf89be20b6c1_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:bb8ce76de216a8cc25d59bf8e7605efc298f2a198c60324ba17cdf89be20b6c1_s390x"
},
"product_reference": "multicluster-engine/assisted-service-8-rhel8@sha256:bb8ce76de216a8cc25d59bf8e7605efc298f2a198c60324ba17cdf89be20b6c1_s390x",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-service-8-rhel8@sha256:c45da32cba975301e6bae6a68a07b89776309e2933c493b3d31adcf01e102273_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 8",
"product_id": "8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:c45da32cba975301e6bae6a68a07b89776309e2933c493b3d31adcf01e102273_ppc64le"
},
"product_reference": "multicluster-engine/assisted-service-8-rhel8@sha256:c45da32cba975301e6bae6a68a07b89776309e2933c493b3d31adcf01e102273_ppc64le",
"relates_to_product_reference": "8Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/addon-manager-rhel9@sha256:28bc6bf67308e3a9d672602b2c01767c80f6b821c458c2d3d933869741ac879d_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:28bc6bf67308e3a9d672602b2c01767c80f6b821c458c2d3d933869741ac879d_arm64"
},
"product_reference": "multicluster-engine/addon-manager-rhel9@sha256:28bc6bf67308e3a9d672602b2c01767c80f6b821c458c2d3d933869741ac879d_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/addon-manager-rhel9@sha256:a5cb6bff2d64bbebc5ddcc2cc44481acf545e92cf52b4acf28588e64e2f33d7d_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:a5cb6bff2d64bbebc5ddcc2cc44481acf545e92cf52b4acf28588e64e2f33d7d_ppc64le"
},
"product_reference": "multicluster-engine/addon-manager-rhel9@sha256:a5cb6bff2d64bbebc5ddcc2cc44481acf545e92cf52b4acf28588e64e2f33d7d_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/addon-manager-rhel9@sha256:d6533bb8ee76ebc8554d086c5a9e802d1507e12b7d75c98692978421f743c903_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:d6533bb8ee76ebc8554d086c5a9e802d1507e12b7d75c98692978421f743c903_amd64"
},
"product_reference": "multicluster-engine/addon-manager-rhel9@sha256:d6533bb8ee76ebc8554d086c5a9e802d1507e12b7d75c98692978421f743c903_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/addon-manager-rhel9@sha256:ed2070762f058659c7c57b96aca27ab0929dadb992c1478a4fe40f2cc46056eb_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:ed2070762f058659c7c57b96aca27ab0929dadb992c1478a4fe40f2cc46056eb_s390x"
},
"product_reference": "multicluster-engine/addon-manager-rhel9@sha256:ed2070762f058659c7c57b96aca27ab0929dadb992c1478a4fe40f2cc46056eb_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:35327c34974a9a064195116403c8c3bf725e0866973c94bf326b73d91d0560c1_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:35327c34974a9a064195116403c8c3bf725e0866973c94bf326b73d91d0560c1_arm64"
},
"product_reference": "multicluster-engine/assisted-service-9-rhel9@sha256:35327c34974a9a064195116403c8c3bf725e0866973c94bf326b73d91d0560c1_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:5c4eac14e5fcdfa079d848501011bcc65a0f5fe056380ab5fa7ae89bac2796ed_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:5c4eac14e5fcdfa079d848501011bcc65a0f5fe056380ab5fa7ae89bac2796ed_amd64"
},
"product_reference": "multicluster-engine/assisted-service-9-rhel9@sha256:5c4eac14e5fcdfa079d848501011bcc65a0f5fe056380ab5fa7ae89bac2796ed_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:69ed5692ef73bb6f700889df40d300aeb4d5b931b24d5b267dfc1a3ae81591e6_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:69ed5692ef73bb6f700889df40d300aeb4d5b931b24d5b267dfc1a3ae81591e6_ppc64le"
},
"product_reference": "multicluster-engine/assisted-service-9-rhel9@sha256:69ed5692ef73bb6f700889df40d300aeb4d5b931b24d5b267dfc1a3ae81591e6_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/assisted-service-9-rhel9@sha256:d30f0114dcbcf436bc2063894aeef28767640950fe8836f275f4d15912f22c13_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:d30f0114dcbcf436bc2063894aeef28767640950fe8836f275f4d15912f22c13_s390x"
},
"product_reference": "multicluster-engine/assisted-service-9-rhel9@sha256:d30f0114dcbcf436bc2063894aeef28767640950fe8836f275f4d15912f22c13_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/backplane-rhel9-operator@sha256:11d7fa3b841b8af36bfb59039d663f21523268ae53e3727aedb3b731e2e8007b_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:11d7fa3b841b8af36bfb59039d663f21523268ae53e3727aedb3b731e2e8007b_s390x"
},
"product_reference": "multicluster-engine/backplane-rhel9-operator@sha256:11d7fa3b841b8af36bfb59039d663f21523268ae53e3727aedb3b731e2e8007b_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/backplane-rhel9-operator@sha256:6c09d889e22b3684e343e37776d2ddaea943f00fa3440565e95a2a098c0e8ca5_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:6c09d889e22b3684e343e37776d2ddaea943f00fa3440565e95a2a098c0e8ca5_ppc64le"
},
"product_reference": "multicluster-engine/backplane-rhel9-operator@sha256:6c09d889e22b3684e343e37776d2ddaea943f00fa3440565e95a2a098c0e8ca5_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/backplane-rhel9-operator@sha256:c534370c7eaea7c3c99eb6efb10e3e35e0f563bb1e822a8ad9001edf9f4d699b_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:c534370c7eaea7c3c99eb6efb10e3e35e0f563bb1e822a8ad9001edf9f4d699b_amd64"
},
"product_reference": "multicluster-engine/backplane-rhel9-operator@sha256:c534370c7eaea7c3c99eb6efb10e3e35e0f563bb1e822a8ad9001edf9f4d699b_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/backplane-rhel9-operator@sha256:c9dc90710afc92487b5b8b5ba9dee955fdf881f11c7df7f8cff2b292bf36a8c9_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:c9dc90710afc92487b5b8b5ba9dee955fdf881f11c7df7f8cff2b292bf36a8c9_arm64"
},
"product_reference": "multicluster-engine/backplane-rhel9-operator@sha256:c9dc90710afc92487b5b8b5ba9dee955fdf881f11c7df7f8cff2b292bf36a8c9_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64"
},
"product_reference": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64"
},
"product_reference": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le"
},
"product_reference": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x"
},
"product_reference": "multicluster-engine/cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:567b55ec3d658b97611c5705b65c8a9a2f291aca755a391941f03fa67c775520_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:567b55ec3d658b97611c5705b65c8a9a2f291aca755a391941f03fa67c775520_arm64"
},
"product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:567b55ec3d658b97611c5705b65c8a9a2f291aca755a391941f03fa67c775520_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9996d77e31cf4adf708c6866c2a3079e623c11539cdc26e05100898faadca31d_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9996d77e31cf4adf708c6866c2a3079e623c11539cdc26e05100898faadca31d_s390x"
},
"product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9996d77e31cf4adf708c6866c2a3079e623c11539cdc26e05100898faadca31d_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a4682fed175f2a6eb0d6b75e2b1075358e814bb85b0a1d2ca71e253bf33c1f2b_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a4682fed175f2a6eb0d6b75e2b1075358e814bb85b0a1d2ca71e253bf33c1f2b_amd64"
},
"product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a4682fed175f2a6eb0d6b75e2b1075358e814bb85b0a1d2ca71e253bf33c1f2b_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a503850af5234e9cda86a542473cee328da17d1088e9a68b71e899a08cff4f1b_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a503850af5234e9cda86a542473cee328da17d1088e9a68b71e899a08cff4f1b_ppc64le"
},
"product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a503850af5234e9cda86a542473cee328da17d1088e9a68b71e899a08cff4f1b_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-rhel9@sha256:03f598ff4299c16803575ecbcc57ce26763659526145da49c70dfb2cf9af53fe_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:03f598ff4299c16803575ecbcc57ce26763659526145da49c70dfb2cf9af53fe_ppc64le"
},
"product_reference": "multicluster-engine/cluster-api-rhel9@sha256:03f598ff4299c16803575ecbcc57ce26763659526145da49c70dfb2cf9af53fe_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-rhel9@sha256:16d96bcd4510853caf8219c5dda1e69a2bde44fe9d11c954e66e55f6cbb4a78c_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:16d96bcd4510853caf8219c5dda1e69a2bde44fe9d11c954e66e55f6cbb4a78c_arm64"
},
"product_reference": "multicluster-engine/cluster-api-rhel9@sha256:16d96bcd4510853caf8219c5dda1e69a2bde44fe9d11c954e66e55f6cbb4a78c_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-rhel9@sha256:b71c59c917a854558b6a6066c81618d0c9cc245dd1e1ca68191de4c14675d1bc_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:b71c59c917a854558b6a6066c81618d0c9cc245dd1e1ca68191de4c14675d1bc_amd64"
},
"product_reference": "multicluster-engine/cluster-api-rhel9@sha256:b71c59c917a854558b6a6066c81618d0c9cc245dd1e1ca68191de4c14675d1bc_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-api-rhel9@sha256:e532ea5f84bc7c942b42e2f324fd2bafbcae7f4dc8f0e43d83741b36f5291a95_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:e532ea5f84bc7c942b42e2f324fd2bafbcae7f4dc8f0e43d83741b36f5291a95_s390x"
},
"product_reference": "multicluster-engine/cluster-api-rhel9@sha256:e532ea5f84bc7c942b42e2f324fd2bafbcae7f4dc8f0e43d83741b36f5291a95_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:5d249467164c9c364cd4dbf8023b53411b2ecd1cb1330d4f1ab7868bdf851021_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:5d249467164c9c364cd4dbf8023b53411b2ecd1cb1330d4f1ab7868bdf851021_ppc64le"
},
"product_reference": "multicluster-engine/cluster-curator-controller-rhel9@sha256:5d249467164c9c364cd4dbf8023b53411b2ecd1cb1330d4f1ab7868bdf851021_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:61189c337af540bc0bb10491e66de30fd7efb9b9536268d43aa638aeb96f18c4_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:61189c337af540bc0bb10491e66de30fd7efb9b9536268d43aa638aeb96f18c4_arm64"
},
"product_reference": "multicluster-engine/cluster-curator-controller-rhel9@sha256:61189c337af540bc0bb10491e66de30fd7efb9b9536268d43aa638aeb96f18c4_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:7f53a3c60934312374ad2914ffba757ed5d0e869b4fb0502c75db9249593744e_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:7f53a3c60934312374ad2914ffba757ed5d0e869b4fb0502c75db9249593744e_s390x"
},
"product_reference": "multicluster-engine/cluster-curator-controller-rhel9@sha256:7f53a3c60934312374ad2914ffba757ed5d0e869b4fb0502c75db9249593744e_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-curator-controller-rhel9@sha256:98251b6070dc37425d775e22b7a22c7e51bb2d75d85f2ae1d4356c307b156748_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:98251b6070dc37425d775e22b7a22c7e51bb2d75d85f2ae1d4356c307b156748_amd64"
},
"product_reference": "multicluster-engine/cluster-curator-controller-rhel9@sha256:98251b6070dc37425d775e22b7a22c7e51bb2d75d85f2ae1d4356c307b156748_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:03a1057b48a105964e3cd49b43e21b9e39717c618d031dfd4bd9e359e086d29c_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:03a1057b48a105964e3cd49b43e21b9e39717c618d031dfd4bd9e359e086d29c_amd64"
},
"product_reference": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:03a1057b48a105964e3cd49b43e21b9e39717c618d031dfd4bd9e359e086d29c_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2d90d279d73845e9b04fb7a3289ce356c4f076dc6934e6b69b3b4ca575a2ff_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2d90d279d73845e9b04fb7a3289ce356c4f076dc6934e6b69b3b4ca575a2ff_ppc64le"
},
"product_reference": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2d90d279d73845e9b04fb7a3289ce356c4f076dc6934e6b69b3b4ca575a2ff_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:6749e9748039c24278b1e49914be37b9f0eb0a231e25bf2943eaf5837a5fdbb0_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:6749e9748039c24278b1e49914be37b9f0eb0a231e25bf2943eaf5837a5fdbb0_s390x"
},
"product_reference": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:6749e9748039c24278b1e49914be37b9f0eb0a231e25bf2943eaf5837a5fdbb0_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:dd78b0e868c1ec1602d91c95601cbfcd482ced9be766bdf27d58a9d8cf253dda_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:dd78b0e868c1ec1602d91c95601cbfcd482ced9be766bdf27d58a9d8cf253dda_arm64"
},
"product_reference": "multicluster-engine/cluster-image-set-controller-rhel9@sha256:dd78b0e868c1ec1602d91c95601cbfcd482ced9be766bdf27d58a9d8cf253dda_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:7f85ee855ee30ac22a1f1bd3757a2a9dff18a8aa8495810dc6b70b7a00d8d115_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:7f85ee855ee30ac22a1f1bd3757a2a9dff18a8aa8495810dc6b70b7a00d8d115_s390x"
},
"product_reference": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:7f85ee855ee30ac22a1f1bd3757a2a9dff18a8aa8495810dc6b70b7a00d8d115_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:8049c3dcc7a3108c4be57168b215d2a837fd2ac13e97e04f005280aa45a3aa55_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:8049c3dcc7a3108c4be57168b215d2a837fd2ac13e97e04f005280aa45a3aa55_amd64"
},
"product_reference": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:8049c3dcc7a3108c4be57168b215d2a837fd2ac13e97e04f005280aa45a3aa55_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:97cc35103eb35f218af98d983157ffb2f893333d68ca232411ab2fae88b90971_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:97cc35103eb35f218af98d983157ffb2f893333d68ca232411ab2fae88b90971_ppc64le"
},
"product_reference": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:97cc35103eb35f218af98d983157ffb2f893333d68ca232411ab2fae88b90971_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:f46d8770dbf1c60fffaddb1630cbd4b3afd4dab9a4bc16c6f814d762ee2f6225_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:f46d8770dbf1c60fffaddb1630cbd4b3afd4dab9a4bc16c6f814d762ee2f6225_arm64"
},
"product_reference": "multicluster-engine/cluster-proxy-addon-rhel9@sha256:f46d8770dbf1c60fffaddb1630cbd4b3afd4dab9a4bc16c6f814d762ee2f6225_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:4140916af5904c58dcf636d6a80ccd180c9f7f417ade6de9b18a9d17b93e0f7a_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:4140916af5904c58dcf636d6a80ccd180c9f7f417ade6de9b18a9d17b93e0f7a_ppc64le"
},
"product_reference": "multicluster-engine/cluster-proxy-rhel9@sha256:4140916af5904c58dcf636d6a80ccd180c9f7f417ade6de9b18a9d17b93e0f7a_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:baf330884101327732eca8f78fc65bae7fb34ac5faba8f93491d42de237a177c_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:baf330884101327732eca8f78fc65bae7fb34ac5faba8f93491d42de237a177c_arm64"
},
"product_reference": "multicluster-engine/cluster-proxy-rhel9@sha256:baf330884101327732eca8f78fc65bae7fb34ac5faba8f93491d42de237a177c_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:c922b2d36c86fe89e620eb288ce52904d6ff718154fc4ab9f54f117b847967a1_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:c922b2d36c86fe89e620eb288ce52904d6ff718154fc4ab9f54f117b847967a1_s390x"
},
"product_reference": "multicluster-engine/cluster-proxy-rhel9@sha256:c922b2d36c86fe89e620eb288ce52904d6ff718154fc4ab9f54f117b847967a1_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/cluster-proxy-rhel9@sha256:ebd96dc01ab5c758a12084730ab144425d2d76f24dcd4bd8ac41f6052488398f_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:ebd96dc01ab5c758a12084730ab144425d2d76f24dcd4bd8ac41f6052488398f_amd64"
},
"product_reference": "multicluster-engine/cluster-proxy-rhel9@sha256:ebd96dc01ab5c758a12084730ab144425d2d76f24dcd4bd8ac41f6052488398f_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:03239302e7484ae4e7e915b2d2328e3eaed6ea9384486913f923b37eaabe8dd3_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:03239302e7484ae4e7e915b2d2328e3eaed6ea9384486913f923b37eaabe8dd3_s390x"
},
"product_reference": "multicluster-engine/clusterclaims-controller-rhel9@sha256:03239302e7484ae4e7e915b2d2328e3eaed6ea9384486913f923b37eaabe8dd3_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:428934b9a6b8fb2d7143d568ddf4751bd760584e695df9524c3338ac52918b52_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:428934b9a6b8fb2d7143d568ddf4751bd760584e695df9524c3338ac52918b52_amd64"
},
"product_reference": "multicluster-engine/clusterclaims-controller-rhel9@sha256:428934b9a6b8fb2d7143d568ddf4751bd760584e695df9524c3338ac52918b52_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:e04cae5b2bd55331fe04ae2aea8a1db34f68ddf6bf98ee08cd551b874cd9d4f7_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:e04cae5b2bd55331fe04ae2aea8a1db34f68ddf6bf98ee08cd551b874cd9d4f7_ppc64le"
},
"product_reference": "multicluster-engine/clusterclaims-controller-rhel9@sha256:e04cae5b2bd55331fe04ae2aea8a1db34f68ddf6bf98ee08cd551b874cd9d4f7_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterclaims-controller-rhel9@sha256:fbe0401ee2c60f07f9f3cea7ab5b2563f9035e609c39ae8e6e1e5aa80171ffe6_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:fbe0401ee2c60f07f9f3cea7ab5b2563f9035e609c39ae8e6e1e5aa80171ffe6_arm64"
},
"product_reference": "multicluster-engine/clusterclaims-controller-rhel9@sha256:fbe0401ee2c60f07f9f3cea7ab5b2563f9035e609c39ae8e6e1e5aa80171ffe6_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:45084f59b43f0b380e661b82e338c8ccffedbfe59cd79034c40fcf9056ae422c_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:45084f59b43f0b380e661b82e338c8ccffedbfe59cd79034c40fcf9056ae422c_ppc64le"
},
"product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:45084f59b43f0b380e661b82e338c8ccffedbfe59cd79034c40fcf9056ae422c_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:5942bb085d89cb610ee023bbefe22ee375105a282d8b505d3f050bb5ce13c076_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:5942bb085d89cb610ee023bbefe22ee375105a282d8b505d3f050bb5ce13c076_amd64"
},
"product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:5942bb085d89cb610ee023bbefe22ee375105a282d8b505d3f050bb5ce13c076_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:dfacaa2c151351ef08bd04fbe231d01d0fe191fab99cfc7994227bd1207b7146_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:dfacaa2c151351ef08bd04fbe231d01d0fe191fab99cfc7994227bd1207b7146_s390x"
},
"product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:dfacaa2c151351ef08bd04fbe231d01d0fe191fab99cfc7994227bd1207b7146_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:efa95a5a96ecb8b47c1f03a0ee59adb19165494fe0c5e7fea7a6c379056f4ead_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:efa95a5a96ecb8b47c1f03a0ee59adb19165494fe0c5e7fea7a6c379056f4ead_arm64"
},
"product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:efa95a5a96ecb8b47c1f03a0ee59adb19165494fe0c5e7fea7a6c379056f4ead_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x"
},
"product_reference": "multicluster-engine/console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le"
},
"product_reference": "multicluster-engine/console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64"
},
"product_reference": "multicluster-engine/console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64"
},
"product_reference": "multicluster-engine/console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/discovery-rhel9@sha256:5b912b55233d31d8b11e5dcd764501e7d3677e6c16695e79e0626ea8052a4b1f_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:5b912b55233d31d8b11e5dcd764501e7d3677e6c16695e79e0626ea8052a4b1f_ppc64le"
},
"product_reference": "multicluster-engine/discovery-rhel9@sha256:5b912b55233d31d8b11e5dcd764501e7d3677e6c16695e79e0626ea8052a4b1f_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/discovery-rhel9@sha256:86039c1c04b1b2424d02b6a80890d0d5559a0d2821ea03441676e069fcd1d242_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:86039c1c04b1b2424d02b6a80890d0d5559a0d2821ea03441676e069fcd1d242_s390x"
},
"product_reference": "multicluster-engine/discovery-rhel9@sha256:86039c1c04b1b2424d02b6a80890d0d5559a0d2821ea03441676e069fcd1d242_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/discovery-rhel9@sha256:c4d7943c78a426f6284af594952bb007b6dcb00eeb8aa00908d1a0da8688aa4d_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:c4d7943c78a426f6284af594952bb007b6dcb00eeb8aa00908d1a0da8688aa4d_amd64"
},
"product_reference": "multicluster-engine/discovery-rhel9@sha256:c4d7943c78a426f6284af594952bb007b6dcb00eeb8aa00908d1a0da8688aa4d_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/discovery-rhel9@sha256:ea514a667518bc1cc7de8e9b3e34212e3576c6cad82ad36c3704b42c6d40d444_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:ea514a667518bc1cc7de8e9b3e34212e3576c6cad82ad36c3704b42c6d40d444_arm64"
},
"product_reference": "multicluster-engine/discovery-rhel9@sha256:ea514a667518bc1cc7de8e9b3e34212e3576c6cad82ad36c3704b42c6d40d444_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hive-rhel9@sha256:6b3933d68a7089d5f82a4c7a4223ce895ffddd8b38565a7fc9a9efc41e43fed1_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:6b3933d68a7089d5f82a4c7a4223ce895ffddd8b38565a7fc9a9efc41e43fed1_s390x"
},
"product_reference": "multicluster-engine/hive-rhel9@sha256:6b3933d68a7089d5f82a4c7a4223ce895ffddd8b38565a7fc9a9efc41e43fed1_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hive-rhel9@sha256:7d216b785359d81fedeeb33ebd214837a903ff301d2a4832418fe232f7bc1f21_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:7d216b785359d81fedeeb33ebd214837a903ff301d2a4832418fe232f7bc1f21_amd64"
},
"product_reference": "multicluster-engine/hive-rhel9@sha256:7d216b785359d81fedeeb33ebd214837a903ff301d2a4832418fe232f7bc1f21_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hive-rhel9@sha256:f95c940003b1b1a21302ce165b2760348c2c47a7155d78daf4ee7eb409524142_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:f95c940003b1b1a21302ce165b2760348c2c47a7155d78daf4ee7eb409524142_ppc64le"
},
"product_reference": "multicluster-engine/hive-rhel9@sha256:f95c940003b1b1a21302ce165b2760348c2c47a7155d78daf4ee7eb409524142_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hive-rhel9@sha256:fe2040c631ff796b5fc07517a3f2e4cf63e30e6cd170791fda4dc92971efc314_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:fe2040c631ff796b5fc07517a3f2e4cf63e30e6cd170791fda4dc92971efc314_arm64"
},
"product_reference": "multicluster-engine/hive-rhel9@sha256:fe2040c631ff796b5fc07517a3f2e4cf63e30e6cd170791fda4dc92971efc314_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le"
},
"product_reference": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64"
},
"product_reference": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64"
},
"product_reference": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x"
},
"product_reference": "multicluster-engine/hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:20a016b283e27f58633ee646c5c6c86feb9ad0f5fb6663de086186400b46621c_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:20a016b283e27f58633ee646c5c6c86feb9ad0f5fb6663de086186400b46621c_arm64"
},
"product_reference": "multicluster-engine/hypershift-cli-rhel9@sha256:20a016b283e27f58633ee646c5c6c86feb9ad0f5fb6663de086186400b46621c_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:62da20be3123fa6d814e7b7949751673559f87a951e89d2fcc408ceb50a8f52f_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:62da20be3123fa6d814e7b7949751673559f87a951e89d2fcc408ceb50a8f52f_amd64"
},
"product_reference": "multicluster-engine/hypershift-cli-rhel9@sha256:62da20be3123fa6d814e7b7949751673559f87a951e89d2fcc408ceb50a8f52f_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:b3663745add6e398f05c0328d430b5d4b0b7596fe7ad9dc66ad9120fb915e071_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:b3663745add6e398f05c0328d430b5d4b0b7596fe7ad9dc66ad9120fb915e071_s390x"
},
"product_reference": "multicluster-engine/hypershift-cli-rhel9@sha256:b3663745add6e398f05c0328d430b5d4b0b7596fe7ad9dc66ad9120fb915e071_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-cli-rhel9@sha256:df909b7eb08718a1c917fd812357ec40835cab57a8e2b2f25d6d35f45e5b6ab8_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:df909b7eb08718a1c917fd812357ec40835cab57a8e2b2f25d6d35f45e5b6ab8_ppc64le"
},
"product_reference": "multicluster-engine/hypershift-cli-rhel9@sha256:df909b7eb08718a1c917fd812357ec40835cab57a8e2b2f25d6d35f45e5b6ab8_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:23d7fdf8d30a2030c78bff04bda2208635a16b00481bb26cfdc270ccc4c0e68b_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:23d7fdf8d30a2030c78bff04bda2208635a16b00481bb26cfdc270ccc4c0e68b_arm64"
},
"product_reference": "multicluster-engine/hypershift-rhel9-operator@sha256:23d7fdf8d30a2030c78bff04bda2208635a16b00481bb26cfdc270ccc4c0e68b_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:930028ea4fe287a7f3c2ec59216725b8918c284db16fbb2bc6c2726b8bad6d36_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:930028ea4fe287a7f3c2ec59216725b8918c284db16fbb2bc6c2726b8bad6d36_ppc64le"
},
"product_reference": "multicluster-engine/hypershift-rhel9-operator@sha256:930028ea4fe287a7f3c2ec59216725b8918c284db16fbb2bc6c2726b8bad6d36_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:d8ae1b34eff5e87770c42de001a5dfbeca526250d82a49acb6a6c2d014015422_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:d8ae1b34eff5e87770c42de001a5dfbeca526250d82a49acb6a6c2d014015422_amd64"
},
"product_reference": "multicluster-engine/hypershift-rhel9-operator@sha256:d8ae1b34eff5e87770c42de001a5dfbeca526250d82a49acb6a6c2d014015422_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/hypershift-rhel9-operator@sha256:e9e6736a93698c80fee0bf0338d5305d2154b1edf668d6a2dc88345aa91c5047_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:e9e6736a93698c80fee0bf0338d5305d2154b1edf668d6a2dc88345aa91c5047_s390x"
},
"product_reference": "multicluster-engine/hypershift-rhel9-operator@sha256:e9e6736a93698c80fee0bf0338d5305d2154b1edf668d6a2dc88345aa91c5047_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/image-based-install-rhel9@sha256:0ae5132a4a57e208a654374fe4489da16259d59e929ced2b4a7c216227774ea5_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:0ae5132a4a57e208a654374fe4489da16259d59e929ced2b4a7c216227774ea5_ppc64le"
},
"product_reference": "multicluster-engine/image-based-install-rhel9@sha256:0ae5132a4a57e208a654374fe4489da16259d59e929ced2b4a7c216227774ea5_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/image-based-install-rhel9@sha256:12d0c8d22b4233e101d40adf4af6a1dd05814d137070b5ffe12644e23975b9ef_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:12d0c8d22b4233e101d40adf4af6a1dd05814d137070b5ffe12644e23975b9ef_arm64"
},
"product_reference": "multicluster-engine/image-based-install-rhel9@sha256:12d0c8d22b4233e101d40adf4af6a1dd05814d137070b5ffe12644e23975b9ef_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/image-based-install-rhel9@sha256:c27f1f2e7aad3896ecce8b9bd2824ca06b83f5f5fd7b4406b2f6d1487b9da353_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:c27f1f2e7aad3896ecce8b9bd2824ca06b83f5f5fd7b4406b2f6d1487b9da353_s390x"
},
"product_reference": "multicluster-engine/image-based-install-rhel9@sha256:c27f1f2e7aad3896ecce8b9bd2824ca06b83f5f5fd7b4406b2f6d1487b9da353_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/image-based-install-rhel9@sha256:ce98b1afd8165d9f99e6d0bb542f4d84e5cbe3db242cea9dff09137274050ad9_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:ce98b1afd8165d9f99e6d0bb542f4d84e5cbe3db242cea9dff09137274050ad9_amd64"
},
"product_reference": "multicluster-engine/image-based-install-rhel9@sha256:ce98b1afd8165d9f99e6d0bb542f4d84e5cbe3db242cea9dff09137274050ad9_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:061a7f9082146c8d30352986d83af4b18549f2a0447719e943b0f69fc20465a7_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:061a7f9082146c8d30352986d83af4b18549f2a0447719e943b0f69fc20465a7_amd64"
},
"product_reference": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:061a7f9082146c8d30352986d83af4b18549f2a0447719e943b0f69fc20465a7_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:b110cc312114fcae5d85daa3671266c192f6315c3beaf3aafa8b16ae85ae6e8e_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:b110cc312114fcae5d85daa3671266c192f6315c3beaf3aafa8b16ae85ae6e8e_s390x"
},
"product_reference": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:b110cc312114fcae5d85daa3671266c192f6315c3beaf3aafa8b16ae85ae6e8e_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:be27bde4cc9fe5ab30e9d0b2bd5b65724c23f4a2c6a774c70253b02a567b5e7f_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:be27bde4cc9fe5ab30e9d0b2bd5b65724c23f4a2c6a774c70253b02a567b5e7f_ppc64le"
},
"product_reference": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:be27bde4cc9fe5ab30e9d0b2bd5b65724c23f4a2c6a774c70253b02a567b5e7f_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d4e41b4449e59290dcea64440e49eb09605faf15b3a4d3620591c610fd8cba76_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d4e41b4449e59290dcea64440e49eb09605faf15b3a4d3620591c610fd8cba76_arm64"
},
"product_reference": "multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d4e41b4449e59290dcea64440e49eb09605faf15b3a4d3620591c610fd8cba76_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64"
},
"product_reference": "multicluster-engine/managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x"
},
"product_reference": "multicluster-engine/managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64"
},
"product_reference": "multicluster-engine/managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le"
},
"product_reference": "multicluster-engine/managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:64c65223d68e5470d9f94bba18986d6db4476ce58a12043a1c38b6fc57374bc4_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:64c65223d68e5470d9f94bba18986d6db4476ce58a12043a1c38b6fc57374bc4_amd64"
},
"product_reference": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:64c65223d68e5470d9f94bba18986d6db4476ce58a12043a1c38b6fc57374bc4_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:71f1703a8394fcf7f957213545130b01a56b06e2aceb3d96852f9dbc0dc0d625_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:71f1703a8394fcf7f957213545130b01a56b06e2aceb3d96852f9dbc0dc0d625_arm64"
},
"product_reference": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:71f1703a8394fcf7f957213545130b01a56b06e2aceb3d96852f9dbc0dc0d625_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:ae230b8ede9d4d3f1d8fad744c979518279cebe62e9d066bcc0691d3f1c0c019_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:ae230b8ede9d4d3f1d8fad744c979518279cebe62e9d066bcc0691d3f1c0c019_ppc64le"
},
"product_reference": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:ae230b8ede9d4d3f1d8fad744c979518279cebe62e9d066bcc0691d3f1c0c019_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:fa420b9f08b8a8828a6625f53427690e1cab646088639b9f5f60b8f44623e723_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:fa420b9f08b8a8828a6625f53427690e1cab646088639b9f5f60b8f44623e723_s390x"
},
"product_reference": "multicluster-engine/managedcluster-import-controller-rhel9@sha256:fa420b9f08b8a8828a6625f53427690e1cab646088639b9f5f60b8f44623e723_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/mce-operator-bundle@sha256:2359ffdb8fdad57598a8405c3156f51f6e13898c137c2c26f8257fd112ed808f_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:2359ffdb8fdad57598a8405c3156f51f6e13898c137c2c26f8257fd112ed808f_s390x"
},
"product_reference": "multicluster-engine/mce-operator-bundle@sha256:2359ffdb8fdad57598a8405c3156f51f6e13898c137c2c26f8257fd112ed808f_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/mce-operator-bundle@sha256:4385a988f9cee63ff4df54d70347f4509acaf4d8e6fb6c7d7d7b58c634aec3f7_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:4385a988f9cee63ff4df54d70347f4509acaf4d8e6fb6c7d7d7b58c634aec3f7_amd64"
},
"product_reference": "multicluster-engine/mce-operator-bundle@sha256:4385a988f9cee63ff4df54d70347f4509acaf4d8e6fb6c7d7d7b58c634aec3f7_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/mce-operator-bundle@sha256:b56682e6b4d08a6992df430a0da878e7977027216776789e2887a110c28c3e2b_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:b56682e6b4d08a6992df430a0da878e7977027216776789e2887a110c28c3e2b_ppc64le"
},
"product_reference": "multicluster-engine/mce-operator-bundle@sha256:b56682e6b4d08a6992df430a0da878e7977027216776789e2887a110c28c3e2b_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:291cca7f9fb3ca1d0e353db4ff1478d598ee7ef3a24ada16be64c96482267e60_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:291cca7f9fb3ca1d0e353db4ff1478d598ee7ef3a24ada16be64c96482267e60_s390x"
},
"product_reference": "multicluster-engine/multicloud-manager-rhel9@sha256:291cca7f9fb3ca1d0e353db4ff1478d598ee7ef3a24ada16be64c96482267e60_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:425d22934abc149c70946caac4800590ae26d0ec732b17b3140c3cf943afc1f8_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:425d22934abc149c70946caac4800590ae26d0ec732b17b3140c3cf943afc1f8_ppc64le"
},
"product_reference": "multicluster-engine/multicloud-manager-rhel9@sha256:425d22934abc149c70946caac4800590ae26d0ec732b17b3140c3cf943afc1f8_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:a1a144538acd889a3a6382068b19e5ee8293294a8725f7c9e7918187ecdd282e_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:a1a144538acd889a3a6382068b19e5ee8293294a8725f7c9e7918187ecdd282e_amd64"
},
"product_reference": "multicluster-engine/multicloud-manager-rhel9@sha256:a1a144538acd889a3a6382068b19e5ee8293294a8725f7c9e7918187ecdd282e_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicloud-manager-rhel9@sha256:ccb53707ebf3a8295d4463e430b9fe901736d08105222630da9d415ba0779a76_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:ccb53707ebf3a8295d4463e430b9fe901736d08105222630da9d415ba0779a76_arm64"
},
"product_reference": "multicluster-engine/multicloud-manager-rhel9@sha256:ccb53707ebf3a8295d4463e430b9fe901736d08105222630da9d415ba0779a76_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64"
},
"product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64"
},
"product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le"
},
"product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x"
},
"product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x"
},
"product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le"
},
"product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64"
},
"product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64"
},
"product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le"
},
"product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64"
},
"product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64"
},
"product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x"
},
"product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64"
},
"product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x"
},
"product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64"
},
"product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le"
},
"product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/must-gather-rhel9@sha256:530552bc7040af67f67af2828250a4ebabb6d9d528935c778b1d78c1dba817eb_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:530552bc7040af67f67af2828250a4ebabb6d9d528935c778b1d78c1dba817eb_amd64"
},
"product_reference": "multicluster-engine/must-gather-rhel9@sha256:530552bc7040af67f67af2828250a4ebabb6d9d528935c778b1d78c1dba817eb_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/must-gather-rhel9@sha256:c8cb84783aad7439fb7ec9fb7118d15fff731e0df42ddd0d6cce9d0300e296f0_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:c8cb84783aad7439fb7ec9fb7118d15fff731e0df42ddd0d6cce9d0300e296f0_arm64"
},
"product_reference": "multicluster-engine/must-gather-rhel9@sha256:c8cb84783aad7439fb7ec9fb7118d15fff731e0df42ddd0d6cce9d0300e296f0_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/must-gather-rhel9@sha256:cad141cf8d10a7b251dab93ae23fe2be15847f68a040c0580bcc593ef25fc15c_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:cad141cf8d10a7b251dab93ae23fe2be15847f68a040c0580bcc593ef25fc15c_ppc64le"
},
"product_reference": "multicluster-engine/must-gather-rhel9@sha256:cad141cf8d10a7b251dab93ae23fe2be15847f68a040c0580bcc593ef25fc15c_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/must-gather-rhel9@sha256:e65dc6c5996a11b328cc4950b821e4a00b2e3cf504e767992eca097bd0387f03_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:e65dc6c5996a11b328cc4950b821e4a00b2e3cf504e767992eca097bd0387f03_s390x"
},
"product_reference": "multicluster-engine/must-gather-rhel9@sha256:e65dc6c5996a11b328cc4950b821e4a00b2e3cf504e767992eca097bd0387f03_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/placement-rhel9@sha256:18dbe0d0c1e4be68c26db5ef17a2f11ebfceeda7077d0834426d62fcb0d0b703_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:18dbe0d0c1e4be68c26db5ef17a2f11ebfceeda7077d0834426d62fcb0d0b703_s390x"
},
"product_reference": "multicluster-engine/placement-rhel9@sha256:18dbe0d0c1e4be68c26db5ef17a2f11ebfceeda7077d0834426d62fcb0d0b703_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/placement-rhel9@sha256:32a74c4daafbc2812c146bd4cf8bb91a6e2751156b14dfbd00fcb0eab0d12d93_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:32a74c4daafbc2812c146bd4cf8bb91a6e2751156b14dfbd00fcb0eab0d12d93_amd64"
},
"product_reference": "multicluster-engine/placement-rhel9@sha256:32a74c4daafbc2812c146bd4cf8bb91a6e2751156b14dfbd00fcb0eab0d12d93_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/placement-rhel9@sha256:3584c7a2498f8d3714bd478ebf3561440dbead1c0058c21b7b137061782ac783_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:3584c7a2498f8d3714bd478ebf3561440dbead1c0058c21b7b137061782ac783_ppc64le"
},
"product_reference": "multicluster-engine/placement-rhel9@sha256:3584c7a2498f8d3714bd478ebf3561440dbead1c0058c21b7b137061782ac783_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/placement-rhel9@sha256:6ec0c37ea9f203f4fb95d2cdcfd7ab447f81f8401cd68531c03bf5d5fb5a5155_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:6ec0c37ea9f203f4fb95d2cdcfd7ab447f81f8401cd68531c03bf5d5fb5a5155_arm64"
},
"product_reference": "multicluster-engine/placement-rhel9@sha256:6ec0c37ea9f203f4fb95d2cdcfd7ab447f81f8401cd68531c03bf5d5fb5a5155_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:238ba8b48e163b71b84a6c960188aeff6c42226c176ce01441ff088aa62625bd_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:238ba8b48e163b71b84a6c960188aeff6c42226c176ce01441ff088aa62625bd_arm64"
},
"product_reference": "multicluster-engine/provider-credential-controller-rhel9@sha256:238ba8b48e163b71b84a6c960188aeff6c42226c176ce01441ff088aa62625bd_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:2be3dec184056c3f466456febc08b8ae8036814a33ce12aedeb32ff71d5cbab6_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:2be3dec184056c3f466456febc08b8ae8036814a33ce12aedeb32ff71d5cbab6_s390x"
},
"product_reference": "multicluster-engine/provider-credential-controller-rhel9@sha256:2be3dec184056c3f466456febc08b8ae8036814a33ce12aedeb32ff71d5cbab6_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:38af12a197029fa68baf34a6dc31dd1ed009b7257c547d582ad2ccc7d90bec5f_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:38af12a197029fa68baf34a6dc31dd1ed009b7257c547d582ad2ccc7d90bec5f_amd64"
},
"product_reference": "multicluster-engine/provider-credential-controller-rhel9@sha256:38af12a197029fa68baf34a6dc31dd1ed009b7257c547d582ad2ccc7d90bec5f_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/provider-credential-controller-rhel9@sha256:f28e006870115a0f807fd6e7603dc3b5427d6aac9a7252c2f9821f40dd5cda63_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:f28e006870115a0f807fd6e7603dc3b5427d6aac9a7252c2f9821f40dd5cda63_ppc64le"
},
"product_reference": "multicluster-engine/provider-credential-controller-rhel9@sha256:f28e006870115a0f807fd6e7603dc3b5427d6aac9a7252c2f9821f40dd5cda63_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-operator-rhel9@sha256:013fdab49e3bf2a1130865cce36af33d090c8874338f17c529a7581226c34900_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:013fdab49e3bf2a1130865cce36af33d090c8874338f17c529a7581226c34900_s390x"
},
"product_reference": "multicluster-engine/registration-operator-rhel9@sha256:013fdab49e3bf2a1130865cce36af33d090c8874338f17c529a7581226c34900_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-operator-rhel9@sha256:16712e3f1fc76fd958a8de9ac5c52c12d850d3632e2bd3f14c627c39972e6902_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:16712e3f1fc76fd958a8de9ac5c52c12d850d3632e2bd3f14c627c39972e6902_amd64"
},
"product_reference": "multicluster-engine/registration-operator-rhel9@sha256:16712e3f1fc76fd958a8de9ac5c52c12d850d3632e2bd3f14c627c39972e6902_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-operator-rhel9@sha256:1d3327756a221735149cd26a6d5f0d80cc44e16b7c89ec6ccf665d930eb64012_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:1d3327756a221735149cd26a6d5f0d80cc44e16b7c89ec6ccf665d930eb64012_ppc64le"
},
"product_reference": "multicluster-engine/registration-operator-rhel9@sha256:1d3327756a221735149cd26a6d5f0d80cc44e16b7c89ec6ccf665d930eb64012_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-operator-rhel9@sha256:743bf65b5a6369b6199e8e04749bbd56d7cdfe86baebb8fa009e78c087c7afba_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:743bf65b5a6369b6199e8e04749bbd56d7cdfe86baebb8fa009e78c087c7afba_arm64"
},
"product_reference": "multicluster-engine/registration-operator-rhel9@sha256:743bf65b5a6369b6199e8e04749bbd56d7cdfe86baebb8fa009e78c087c7afba_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-rhel9@sha256:1e620a945b98f982970118aed4b25331a8b4dba2ed4e879213a26f1976181cf7_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:1e620a945b98f982970118aed4b25331a8b4dba2ed4e879213a26f1976181cf7_ppc64le"
},
"product_reference": "multicluster-engine/registration-rhel9@sha256:1e620a945b98f982970118aed4b25331a8b4dba2ed4e879213a26f1976181cf7_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-rhel9@sha256:2c810af89c2198900c1605b1a02ab7870d6b8811e56b235d84628dacc6c45e15_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:2c810af89c2198900c1605b1a02ab7870d6b8811e56b235d84628dacc6c45e15_s390x"
},
"product_reference": "multicluster-engine/registration-rhel9@sha256:2c810af89c2198900c1605b1a02ab7870d6b8811e56b235d84628dacc6c45e15_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-rhel9@sha256:aec214dbc01379ca8a14b1babdd209ce179da949ca95e4628be3480f4c422b78_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:aec214dbc01379ca8a14b1babdd209ce179da949ca95e4628be3480f4c422b78_amd64"
},
"product_reference": "multicluster-engine/registration-rhel9@sha256:aec214dbc01379ca8a14b1babdd209ce179da949ca95e4628be3480f4c422b78_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/registration-rhel9@sha256:d2069ea2e2e0afe955d179e265b30fe323c160af5354209a41ee78f28e95ecdf_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:d2069ea2e2e0afe955d179e265b30fe323c160af5354209a41ee78f28e95ecdf_arm64"
},
"product_reference": "multicluster-engine/registration-rhel9@sha256:d2069ea2e2e0afe955d179e265b30fe323c160af5354209a41ee78f28e95ecdf_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/work-rhel9@sha256:000b11a47509f43f12061ecfc3595830e70d06686bf42b67ea0f3a8a4049ddec_arm64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:000b11a47509f43f12061ecfc3595830e70d06686bf42b67ea0f3a8a4049ddec_arm64"
},
"product_reference": "multicluster-engine/work-rhel9@sha256:000b11a47509f43f12061ecfc3595830e70d06686bf42b67ea0f3a8a4049ddec_arm64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/work-rhel9@sha256:28d013309629353d8439be41123c1cd7d2c007bd66be589fc7da66f180943dd7_ppc64le as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:28d013309629353d8439be41123c1cd7d2c007bd66be589fc7da66f180943dd7_ppc64le"
},
"product_reference": "multicluster-engine/work-rhel9@sha256:28d013309629353d8439be41123c1cd7d2c007bd66be589fc7da66f180943dd7_ppc64le",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/work-rhel9@sha256:74ee51bbdfb3e06072ddba3d2d6f8afb9e07562660a7f97dca48627738402440_amd64 as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:74ee51bbdfb3e06072ddba3d2d6f8afb9e07562660a7f97dca48627738402440_amd64"
},
"product_reference": "multicluster-engine/work-rhel9@sha256:74ee51bbdfb3e06072ddba3d2d6f8afb9e07562660a7f97dca48627738402440_amd64",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "multicluster-engine/work-rhel9@sha256:dd0c26976b4ed86d8b14aa0bf10aa56a484c38af721803e99248bbed85173b65_s390x as a component of multicluster engine for Kubernetes 2.6 for RHEL 9",
"product_id": "9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:dd0c26976b4ed86d8b14aa0bf10aa56a484c38af721803e99248bbed85173b65_s390x"
},
"product_reference": "multicluster-engine/work-rhel9@sha256:dd0c26976b4ed86d8b14aa0bf10aa56a484c38af721803e99248bbed85173b65_s390x",
"relates_to_product_reference": "9Base-multicluster-engine-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:6c97acea30e0679b19b2d9b43c3a09f72571dfc28e5f736fe0299ab69014a6b4_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:b7c150e874c43418d35091154f768906eb0ad8dd3ed509465922c6ebb345769e_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:c10d4e4efda73c7c1867a13391e03d408762f1069a0c2a86375d9343b36f5410_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:e45632049ee5e501773b03c3beaed3acc0e5d7345f8d816bbaa90192b12df724_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:0536793606065e327247ec850df060260246ea101985e62604dd5eb7c41f40b1_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:319f7238c812e6ccf020f3b665f88f8236a51ac7740b9d974b50110d7566dcda_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:520fd8238e60409bac8656b1b145ac5c91d20592965dbebdf8563a5129afe4ef_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:ab2d453fc966ddbc6a1a5012b5f70e4be84cd1de739c8b6789ff58288042daec_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:3ae4da39ce451793b88d2aaf68a963273642ca967189e477820ac4bf3db3718d_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:521143779c55b600e9473b24ffb1361672d5d5cbaea2a22a5564645fd3437ec0_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:737eb30b5ae839e6670cc26303b660b0875ae1eeed6438eae1ff03ed1e011bdb_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:eb939c5a630413bcf64f633801a65b9c921f4357ac41ddf52492bbb827957c66_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:2b6ac6ac869393a975f18d57b8b672ce5fb44227c70a1ee9b4c3e9a45b66cf58_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:3d7e94bcd1ea27ebb3c786053a53ff6c5b280b666996378f446ef3b5a045b09f_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:be8d9a854480bda62e5aee71c629139ab73560f0b4020c562b9865012202c0ec_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:e7a270f405cbfe594680d7103b8a59b1de442e65fc6c70590b735b0acd24edc0_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:4ccdd963c97fab0d30058433ba1aad54a69dc9965b57f0f117b7885ca495aedd_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:b1aa30670a0169ff6833fdfef04f383177aa19d2805a361d848e5196f2d4dad9_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:bb8ce76de216a8cc25d59bf8e7605efc298f2a198c60324ba17cdf89be20b6c1_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:c45da32cba975301e6bae6a68a07b89776309e2933c493b3d31adcf01e102273_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:28bc6bf67308e3a9d672602b2c01767c80f6b821c458c2d3d933869741ac879d_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:a5cb6bff2d64bbebc5ddcc2cc44481acf545e92cf52b4acf28588e64e2f33d7d_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:d6533bb8ee76ebc8554d086c5a9e802d1507e12b7d75c98692978421f743c903_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:ed2070762f058659c7c57b96aca27ab0929dadb992c1478a4fe40f2cc46056eb_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:35327c34974a9a064195116403c8c3bf725e0866973c94bf326b73d91d0560c1_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:5c4eac14e5fcdfa079d848501011bcc65a0f5fe056380ab5fa7ae89bac2796ed_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:69ed5692ef73bb6f700889df40d300aeb4d5b931b24d5b267dfc1a3ae81591e6_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:d30f0114dcbcf436bc2063894aeef28767640950fe8836f275f4d15912f22c13_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:11d7fa3b841b8af36bfb59039d663f21523268ae53e3727aedb3b731e2e8007b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:6c09d889e22b3684e343e37776d2ddaea943f00fa3440565e95a2a098c0e8ca5_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:c534370c7eaea7c3c99eb6efb10e3e35e0f563bb1e822a8ad9001edf9f4d699b_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:c9dc90710afc92487b5b8b5ba9dee955fdf881f11c7df7f8cff2b292bf36a8c9_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:567b55ec3d658b97611c5705b65c8a9a2f291aca755a391941f03fa67c775520_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9996d77e31cf4adf708c6866c2a3079e623c11539cdc26e05100898faadca31d_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a4682fed175f2a6eb0d6b75e2b1075358e814bb85b0a1d2ca71e253bf33c1f2b_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a503850af5234e9cda86a542473cee328da17d1088e9a68b71e899a08cff4f1b_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:03f598ff4299c16803575ecbcc57ce26763659526145da49c70dfb2cf9af53fe_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:16d96bcd4510853caf8219c5dda1e69a2bde44fe9d11c954e66e55f6cbb4a78c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:b71c59c917a854558b6a6066c81618d0c9cc245dd1e1ca68191de4c14675d1bc_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:e532ea5f84bc7c942b42e2f324fd2bafbcae7f4dc8f0e43d83741b36f5291a95_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:5d249467164c9c364cd4dbf8023b53411b2ecd1cb1330d4f1ab7868bdf851021_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:61189c337af540bc0bb10491e66de30fd7efb9b9536268d43aa638aeb96f18c4_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:7f53a3c60934312374ad2914ffba757ed5d0e869b4fb0502c75db9249593744e_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:98251b6070dc37425d775e22b7a22c7e51bb2d75d85f2ae1d4356c307b156748_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:03a1057b48a105964e3cd49b43e21b9e39717c618d031dfd4bd9e359e086d29c_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2d90d279d73845e9b04fb7a3289ce356c4f076dc6934e6b69b3b4ca575a2ff_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:6749e9748039c24278b1e49914be37b9f0eb0a231e25bf2943eaf5837a5fdbb0_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:dd78b0e868c1ec1602d91c95601cbfcd482ced9be766bdf27d58a9d8cf253dda_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:7f85ee855ee30ac22a1f1bd3757a2a9dff18a8aa8495810dc6b70b7a00d8d115_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:8049c3dcc7a3108c4be57168b215d2a837fd2ac13e97e04f005280aa45a3aa55_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:97cc35103eb35f218af98d983157ffb2f893333d68ca232411ab2fae88b90971_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:f46d8770dbf1c60fffaddb1630cbd4b3afd4dab9a4bc16c6f814d762ee2f6225_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:4140916af5904c58dcf636d6a80ccd180c9f7f417ade6de9b18a9d17b93e0f7a_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:baf330884101327732eca8f78fc65bae7fb34ac5faba8f93491d42de237a177c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:c922b2d36c86fe89e620eb288ce52904d6ff718154fc4ab9f54f117b847967a1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:ebd96dc01ab5c758a12084730ab144425d2d76f24dcd4bd8ac41f6052488398f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:03239302e7484ae4e7e915b2d2328e3eaed6ea9384486913f923b37eaabe8dd3_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:428934b9a6b8fb2d7143d568ddf4751bd760584e695df9524c3338ac52918b52_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:e04cae5b2bd55331fe04ae2aea8a1db34f68ddf6bf98ee08cd551b874cd9d4f7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:fbe0401ee2c60f07f9f3cea7ab5b2563f9035e609c39ae8e6e1e5aa80171ffe6_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:45084f59b43f0b380e661b82e338c8ccffedbfe59cd79034c40fcf9056ae422c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:5942bb085d89cb610ee023bbefe22ee375105a282d8b505d3f050bb5ce13c076_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:dfacaa2c151351ef08bd04fbe231d01d0fe191fab99cfc7994227bd1207b7146_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:efa95a5a96ecb8b47c1f03a0ee59adb19165494fe0c5e7fea7a6c379056f4ead_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:5b912b55233d31d8b11e5dcd764501e7d3677e6c16695e79e0626ea8052a4b1f_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:86039c1c04b1b2424d02b6a80890d0d5559a0d2821ea03441676e069fcd1d242_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:c4d7943c78a426f6284af594952bb007b6dcb00eeb8aa00908d1a0da8688aa4d_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:ea514a667518bc1cc7de8e9b3e34212e3576c6cad82ad36c3704b42c6d40d444_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:6b3933d68a7089d5f82a4c7a4223ce895ffddd8b38565a7fc9a9efc41e43fed1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:7d216b785359d81fedeeb33ebd214837a903ff301d2a4832418fe232f7bc1f21_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:f95c940003b1b1a21302ce165b2760348c2c47a7155d78daf4ee7eb409524142_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:fe2040c631ff796b5fc07517a3f2e4cf63e30e6cd170791fda4dc92971efc314_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:20a016b283e27f58633ee646c5c6c86feb9ad0f5fb6663de086186400b46621c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:62da20be3123fa6d814e7b7949751673559f87a951e89d2fcc408ceb50a8f52f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:b3663745add6e398f05c0328d430b5d4b0b7596fe7ad9dc66ad9120fb915e071_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:df909b7eb08718a1c917fd812357ec40835cab57a8e2b2f25d6d35f45e5b6ab8_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:23d7fdf8d30a2030c78bff04bda2208635a16b00481bb26cfdc270ccc4c0e68b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:930028ea4fe287a7f3c2ec59216725b8918c284db16fbb2bc6c2726b8bad6d36_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:d8ae1b34eff5e87770c42de001a5dfbeca526250d82a49acb6a6c2d014015422_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:e9e6736a93698c80fee0bf0338d5305d2154b1edf668d6a2dc88345aa91c5047_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:0ae5132a4a57e208a654374fe4489da16259d59e929ced2b4a7c216227774ea5_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:12d0c8d22b4233e101d40adf4af6a1dd05814d137070b5ffe12644e23975b9ef_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:c27f1f2e7aad3896ecce8b9bd2824ca06b83f5f5fd7b4406b2f6d1487b9da353_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:ce98b1afd8165d9f99e6d0bb542f4d84e5cbe3db242cea9dff09137274050ad9_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:061a7f9082146c8d30352986d83af4b18549f2a0447719e943b0f69fc20465a7_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:b110cc312114fcae5d85daa3671266c192f6315c3beaf3aafa8b16ae85ae6e8e_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:be27bde4cc9fe5ab30e9d0b2bd5b65724c23f4a2c6a774c70253b02a567b5e7f_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d4e41b4449e59290dcea64440e49eb09605faf15b3a4d3620591c610fd8cba76_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:64c65223d68e5470d9f94bba18986d6db4476ce58a12043a1c38b6fc57374bc4_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:71f1703a8394fcf7f957213545130b01a56b06e2aceb3d96852f9dbc0dc0d625_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:ae230b8ede9d4d3f1d8fad744c979518279cebe62e9d066bcc0691d3f1c0c019_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:fa420b9f08b8a8828a6625f53427690e1cab646088639b9f5f60b8f44623e723_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:2359ffdb8fdad57598a8405c3156f51f6e13898c137c2c26f8257fd112ed808f_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:4385a988f9cee63ff4df54d70347f4509acaf4d8e6fb6c7d7d7b58c634aec3f7_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:b56682e6b4d08a6992df430a0da878e7977027216776789e2887a110c28c3e2b_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:291cca7f9fb3ca1d0e353db4ff1478d598ee7ef3a24ada16be64c96482267e60_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:425d22934abc149c70946caac4800590ae26d0ec732b17b3140c3cf943afc1f8_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:a1a144538acd889a3a6382068b19e5ee8293294a8725f7c9e7918187ecdd282e_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:ccb53707ebf3a8295d4463e430b9fe901736d08105222630da9d415ba0779a76_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:530552bc7040af67f67af2828250a4ebabb6d9d528935c778b1d78c1dba817eb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:c8cb84783aad7439fb7ec9fb7118d15fff731e0df42ddd0d6cce9d0300e296f0_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:cad141cf8d10a7b251dab93ae23fe2be15847f68a040c0580bcc593ef25fc15c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:e65dc6c5996a11b328cc4950b821e4a00b2e3cf504e767992eca097bd0387f03_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:18dbe0d0c1e4be68c26db5ef17a2f11ebfceeda7077d0834426d62fcb0d0b703_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:32a74c4daafbc2812c146bd4cf8bb91a6e2751156b14dfbd00fcb0eab0d12d93_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:3584c7a2498f8d3714bd478ebf3561440dbead1c0058c21b7b137061782ac783_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:6ec0c37ea9f203f4fb95d2cdcfd7ab447f81f8401cd68531c03bf5d5fb5a5155_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:238ba8b48e163b71b84a6c960188aeff6c42226c176ce01441ff088aa62625bd_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:2be3dec184056c3f466456febc08b8ae8036814a33ce12aedeb32ff71d5cbab6_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:38af12a197029fa68baf34a6dc31dd1ed009b7257c547d582ad2ccc7d90bec5f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:f28e006870115a0f807fd6e7603dc3b5427d6aac9a7252c2f9821f40dd5cda63_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:013fdab49e3bf2a1130865cce36af33d090c8874338f17c529a7581226c34900_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:16712e3f1fc76fd958a8de9ac5c52c12d850d3632e2bd3f14c627c39972e6902_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:1d3327756a221735149cd26a6d5f0d80cc44e16b7c89ec6ccf665d930eb64012_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:743bf65b5a6369b6199e8e04749bbd56d7cdfe86baebb8fa009e78c087c7afba_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:1e620a945b98f982970118aed4b25331a8b4dba2ed4e879213a26f1976181cf7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:2c810af89c2198900c1605b1a02ab7870d6b8811e56b235d84628dacc6c45e15_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:aec214dbc01379ca8a14b1babdd209ce179da949ca95e4628be3480f4c422b78_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:d2069ea2e2e0afe955d179e265b30fe323c160af5354209a41ee78f28e95ecdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:000b11a47509f43f12061ecfc3595830e70d06686bf42b67ea0f3a8a4049ddec_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:28d013309629353d8439be41123c1cd7d2c007bd66be589fc7da66f180943dd7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:74ee51bbdfb3e06072ddba3d2d6f8afb9e07562660a7f97dca48627738402440_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:dd0c26976b4ed86d8b14aa0bf10aa56a484c38af721803e99248bbed85173b65_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-28T18:01:10+00:00",
"details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.11/html/clusters/cluster_mce_overview#mce-install-intro",
"product_ids": [
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:6c97acea30e0679b19b2d9b43c3a09f72571dfc28e5f736fe0299ab69014a6b4_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:b7c150e874c43418d35091154f768906eb0ad8dd3ed509465922c6ebb345769e_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:c10d4e4efda73c7c1867a13391e03d408762f1069a0c2a86375d9343b36f5410_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:e45632049ee5e501773b03c3beaed3acc0e5d7345f8d816bbaa90192b12df724_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:0536793606065e327247ec850df060260246ea101985e62604dd5eb7c41f40b1_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:319f7238c812e6ccf020f3b665f88f8236a51ac7740b9d974b50110d7566dcda_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:520fd8238e60409bac8656b1b145ac5c91d20592965dbebdf8563a5129afe4ef_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:ab2d453fc966ddbc6a1a5012b5f70e4be84cd1de739c8b6789ff58288042daec_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:3ae4da39ce451793b88d2aaf68a963273642ca967189e477820ac4bf3db3718d_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:521143779c55b600e9473b24ffb1361672d5d5cbaea2a22a5564645fd3437ec0_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:737eb30b5ae839e6670cc26303b660b0875ae1eeed6438eae1ff03ed1e011bdb_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:eb939c5a630413bcf64f633801a65b9c921f4357ac41ddf52492bbb827957c66_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:2b6ac6ac869393a975f18d57b8b672ce5fb44227c70a1ee9b4c3e9a45b66cf58_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:3d7e94bcd1ea27ebb3c786053a53ff6c5b280b666996378f446ef3b5a045b09f_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:be8d9a854480bda62e5aee71c629139ab73560f0b4020c562b9865012202c0ec_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:e7a270f405cbfe594680d7103b8a59b1de442e65fc6c70590b735b0acd24edc0_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:4ccdd963c97fab0d30058433ba1aad54a69dc9965b57f0f117b7885ca495aedd_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:b1aa30670a0169ff6833fdfef04f383177aa19d2805a361d848e5196f2d4dad9_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:bb8ce76de216a8cc25d59bf8e7605efc298f2a198c60324ba17cdf89be20b6c1_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:c45da32cba975301e6bae6a68a07b89776309e2933c493b3d31adcf01e102273_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:28bc6bf67308e3a9d672602b2c01767c80f6b821c458c2d3d933869741ac879d_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:a5cb6bff2d64bbebc5ddcc2cc44481acf545e92cf52b4acf28588e64e2f33d7d_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:d6533bb8ee76ebc8554d086c5a9e802d1507e12b7d75c98692978421f743c903_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:ed2070762f058659c7c57b96aca27ab0929dadb992c1478a4fe40f2cc46056eb_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:35327c34974a9a064195116403c8c3bf725e0866973c94bf326b73d91d0560c1_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:5c4eac14e5fcdfa079d848501011bcc65a0f5fe056380ab5fa7ae89bac2796ed_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:69ed5692ef73bb6f700889df40d300aeb4d5b931b24d5b267dfc1a3ae81591e6_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:d30f0114dcbcf436bc2063894aeef28767640950fe8836f275f4d15912f22c13_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:11d7fa3b841b8af36bfb59039d663f21523268ae53e3727aedb3b731e2e8007b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:6c09d889e22b3684e343e37776d2ddaea943f00fa3440565e95a2a098c0e8ca5_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:c534370c7eaea7c3c99eb6efb10e3e35e0f563bb1e822a8ad9001edf9f4d699b_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:c9dc90710afc92487b5b8b5ba9dee955fdf881f11c7df7f8cff2b292bf36a8c9_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:567b55ec3d658b97611c5705b65c8a9a2f291aca755a391941f03fa67c775520_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9996d77e31cf4adf708c6866c2a3079e623c11539cdc26e05100898faadca31d_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a4682fed175f2a6eb0d6b75e2b1075358e814bb85b0a1d2ca71e253bf33c1f2b_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a503850af5234e9cda86a542473cee328da17d1088e9a68b71e899a08cff4f1b_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:03f598ff4299c16803575ecbcc57ce26763659526145da49c70dfb2cf9af53fe_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:16d96bcd4510853caf8219c5dda1e69a2bde44fe9d11c954e66e55f6cbb4a78c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:b71c59c917a854558b6a6066c81618d0c9cc245dd1e1ca68191de4c14675d1bc_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:e532ea5f84bc7c942b42e2f324fd2bafbcae7f4dc8f0e43d83741b36f5291a95_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:5d249467164c9c364cd4dbf8023b53411b2ecd1cb1330d4f1ab7868bdf851021_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:61189c337af540bc0bb10491e66de30fd7efb9b9536268d43aa638aeb96f18c4_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:7f53a3c60934312374ad2914ffba757ed5d0e869b4fb0502c75db9249593744e_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:98251b6070dc37425d775e22b7a22c7e51bb2d75d85f2ae1d4356c307b156748_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:03a1057b48a105964e3cd49b43e21b9e39717c618d031dfd4bd9e359e086d29c_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2d90d279d73845e9b04fb7a3289ce356c4f076dc6934e6b69b3b4ca575a2ff_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:6749e9748039c24278b1e49914be37b9f0eb0a231e25bf2943eaf5837a5fdbb0_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:dd78b0e868c1ec1602d91c95601cbfcd482ced9be766bdf27d58a9d8cf253dda_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:7f85ee855ee30ac22a1f1bd3757a2a9dff18a8aa8495810dc6b70b7a00d8d115_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:8049c3dcc7a3108c4be57168b215d2a837fd2ac13e97e04f005280aa45a3aa55_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:97cc35103eb35f218af98d983157ffb2f893333d68ca232411ab2fae88b90971_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:f46d8770dbf1c60fffaddb1630cbd4b3afd4dab9a4bc16c6f814d762ee2f6225_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:4140916af5904c58dcf636d6a80ccd180c9f7f417ade6de9b18a9d17b93e0f7a_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:baf330884101327732eca8f78fc65bae7fb34ac5faba8f93491d42de237a177c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:c922b2d36c86fe89e620eb288ce52904d6ff718154fc4ab9f54f117b847967a1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:ebd96dc01ab5c758a12084730ab144425d2d76f24dcd4bd8ac41f6052488398f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:03239302e7484ae4e7e915b2d2328e3eaed6ea9384486913f923b37eaabe8dd3_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:428934b9a6b8fb2d7143d568ddf4751bd760584e695df9524c3338ac52918b52_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:e04cae5b2bd55331fe04ae2aea8a1db34f68ddf6bf98ee08cd551b874cd9d4f7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:fbe0401ee2c60f07f9f3cea7ab5b2563f9035e609c39ae8e6e1e5aa80171ffe6_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:45084f59b43f0b380e661b82e338c8ccffedbfe59cd79034c40fcf9056ae422c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:5942bb085d89cb610ee023bbefe22ee375105a282d8b505d3f050bb5ce13c076_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:dfacaa2c151351ef08bd04fbe231d01d0fe191fab99cfc7994227bd1207b7146_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:efa95a5a96ecb8b47c1f03a0ee59adb19165494fe0c5e7fea7a6c379056f4ead_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:5b912b55233d31d8b11e5dcd764501e7d3677e6c16695e79e0626ea8052a4b1f_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:86039c1c04b1b2424d02b6a80890d0d5559a0d2821ea03441676e069fcd1d242_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:c4d7943c78a426f6284af594952bb007b6dcb00eeb8aa00908d1a0da8688aa4d_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:ea514a667518bc1cc7de8e9b3e34212e3576c6cad82ad36c3704b42c6d40d444_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:6b3933d68a7089d5f82a4c7a4223ce895ffddd8b38565a7fc9a9efc41e43fed1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:7d216b785359d81fedeeb33ebd214837a903ff301d2a4832418fe232f7bc1f21_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:f95c940003b1b1a21302ce165b2760348c2c47a7155d78daf4ee7eb409524142_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:fe2040c631ff796b5fc07517a3f2e4cf63e30e6cd170791fda4dc92971efc314_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:20a016b283e27f58633ee646c5c6c86feb9ad0f5fb6663de086186400b46621c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:62da20be3123fa6d814e7b7949751673559f87a951e89d2fcc408ceb50a8f52f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:b3663745add6e398f05c0328d430b5d4b0b7596fe7ad9dc66ad9120fb915e071_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:df909b7eb08718a1c917fd812357ec40835cab57a8e2b2f25d6d35f45e5b6ab8_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:23d7fdf8d30a2030c78bff04bda2208635a16b00481bb26cfdc270ccc4c0e68b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:930028ea4fe287a7f3c2ec59216725b8918c284db16fbb2bc6c2726b8bad6d36_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:d8ae1b34eff5e87770c42de001a5dfbeca526250d82a49acb6a6c2d014015422_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:e9e6736a93698c80fee0bf0338d5305d2154b1edf668d6a2dc88345aa91c5047_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:0ae5132a4a57e208a654374fe4489da16259d59e929ced2b4a7c216227774ea5_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:12d0c8d22b4233e101d40adf4af6a1dd05814d137070b5ffe12644e23975b9ef_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:c27f1f2e7aad3896ecce8b9bd2824ca06b83f5f5fd7b4406b2f6d1487b9da353_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:ce98b1afd8165d9f99e6d0bb542f4d84e5cbe3db242cea9dff09137274050ad9_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:061a7f9082146c8d30352986d83af4b18549f2a0447719e943b0f69fc20465a7_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:b110cc312114fcae5d85daa3671266c192f6315c3beaf3aafa8b16ae85ae6e8e_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:be27bde4cc9fe5ab30e9d0b2bd5b65724c23f4a2c6a774c70253b02a567b5e7f_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d4e41b4449e59290dcea64440e49eb09605faf15b3a4d3620591c610fd8cba76_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:64c65223d68e5470d9f94bba18986d6db4476ce58a12043a1c38b6fc57374bc4_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:71f1703a8394fcf7f957213545130b01a56b06e2aceb3d96852f9dbc0dc0d625_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:ae230b8ede9d4d3f1d8fad744c979518279cebe62e9d066bcc0691d3f1c0c019_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:fa420b9f08b8a8828a6625f53427690e1cab646088639b9f5f60b8f44623e723_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:2359ffdb8fdad57598a8405c3156f51f6e13898c137c2c26f8257fd112ed808f_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:4385a988f9cee63ff4df54d70347f4509acaf4d8e6fb6c7d7d7b58c634aec3f7_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:b56682e6b4d08a6992df430a0da878e7977027216776789e2887a110c28c3e2b_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:291cca7f9fb3ca1d0e353db4ff1478d598ee7ef3a24ada16be64c96482267e60_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:425d22934abc149c70946caac4800590ae26d0ec732b17b3140c3cf943afc1f8_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:a1a144538acd889a3a6382068b19e5ee8293294a8725f7c9e7918187ecdd282e_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:ccb53707ebf3a8295d4463e430b9fe901736d08105222630da9d415ba0779a76_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:530552bc7040af67f67af2828250a4ebabb6d9d528935c778b1d78c1dba817eb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:c8cb84783aad7439fb7ec9fb7118d15fff731e0df42ddd0d6cce9d0300e296f0_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:cad141cf8d10a7b251dab93ae23fe2be15847f68a040c0580bcc593ef25fc15c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:e65dc6c5996a11b328cc4950b821e4a00b2e3cf504e767992eca097bd0387f03_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:18dbe0d0c1e4be68c26db5ef17a2f11ebfceeda7077d0834426d62fcb0d0b703_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:32a74c4daafbc2812c146bd4cf8bb91a6e2751156b14dfbd00fcb0eab0d12d93_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:3584c7a2498f8d3714bd478ebf3561440dbead1c0058c21b7b137061782ac783_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:6ec0c37ea9f203f4fb95d2cdcfd7ab447f81f8401cd68531c03bf5d5fb5a5155_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:238ba8b48e163b71b84a6c960188aeff6c42226c176ce01441ff088aa62625bd_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:2be3dec184056c3f466456febc08b8ae8036814a33ce12aedeb32ff71d5cbab6_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:38af12a197029fa68baf34a6dc31dd1ed009b7257c547d582ad2ccc7d90bec5f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:f28e006870115a0f807fd6e7603dc3b5427d6aac9a7252c2f9821f40dd5cda63_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:013fdab49e3bf2a1130865cce36af33d090c8874338f17c529a7581226c34900_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:16712e3f1fc76fd958a8de9ac5c52c12d850d3632e2bd3f14c627c39972e6902_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:1d3327756a221735149cd26a6d5f0d80cc44e16b7c89ec6ccf665d930eb64012_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:743bf65b5a6369b6199e8e04749bbd56d7cdfe86baebb8fa009e78c087c7afba_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:1e620a945b98f982970118aed4b25331a8b4dba2ed4e879213a26f1976181cf7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:2c810af89c2198900c1605b1a02ab7870d6b8811e56b235d84628dacc6c45e15_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:aec214dbc01379ca8a14b1babdd209ce179da949ca95e4628be3480f4c422b78_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:d2069ea2e2e0afe955d179e265b30fe323c160af5354209a41ee78f28e95ecdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:000b11a47509f43f12061ecfc3595830e70d06686bf42b67ea0f3a8a4049ddec_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:28d013309629353d8439be41123c1cd7d2c007bd66be589fc7da66f180943dd7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:74ee51bbdfb3e06072ddba3d2d6f8afb9e07562660a7f97dca48627738402440_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:dd0c26976b4ed86d8b14aa0bf10aa56a484c38af721803e99248bbed85173b65_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5955"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:6c97acea30e0679b19b2d9b43c3a09f72571dfc28e5f736fe0299ab69014a6b4_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:b7c150e874c43418d35091154f768906eb0ad8dd3ed509465922c6ebb345769e_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:c10d4e4efda73c7c1867a13391e03d408762f1069a0c2a86375d9343b36f5410_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:e45632049ee5e501773b03c3beaed3acc0e5d7345f8d816bbaa90192b12df724_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:0536793606065e327247ec850df060260246ea101985e62604dd5eb7c41f40b1_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:319f7238c812e6ccf020f3b665f88f8236a51ac7740b9d974b50110d7566dcda_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:520fd8238e60409bac8656b1b145ac5c91d20592965dbebdf8563a5129afe4ef_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:ab2d453fc966ddbc6a1a5012b5f70e4be84cd1de739c8b6789ff58288042daec_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:3ae4da39ce451793b88d2aaf68a963273642ca967189e477820ac4bf3db3718d_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:521143779c55b600e9473b24ffb1361672d5d5cbaea2a22a5564645fd3437ec0_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:737eb30b5ae839e6670cc26303b660b0875ae1eeed6438eae1ff03ed1e011bdb_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:eb939c5a630413bcf64f633801a65b9c921f4357ac41ddf52492bbb827957c66_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:2b6ac6ac869393a975f18d57b8b672ce5fb44227c70a1ee9b4c3e9a45b66cf58_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:3d7e94bcd1ea27ebb3c786053a53ff6c5b280b666996378f446ef3b5a045b09f_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:be8d9a854480bda62e5aee71c629139ab73560f0b4020c562b9865012202c0ec_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:e7a270f405cbfe594680d7103b8a59b1de442e65fc6c70590b735b0acd24edc0_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:4ccdd963c97fab0d30058433ba1aad54a69dc9965b57f0f117b7885ca495aedd_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:b1aa30670a0169ff6833fdfef04f383177aa19d2805a361d848e5196f2d4dad9_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:bb8ce76de216a8cc25d59bf8e7605efc298f2a198c60324ba17cdf89be20b6c1_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:c45da32cba975301e6bae6a68a07b89776309e2933c493b3d31adcf01e102273_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:28bc6bf67308e3a9d672602b2c01767c80f6b821c458c2d3d933869741ac879d_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:a5cb6bff2d64bbebc5ddcc2cc44481acf545e92cf52b4acf28588e64e2f33d7d_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:d6533bb8ee76ebc8554d086c5a9e802d1507e12b7d75c98692978421f743c903_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:ed2070762f058659c7c57b96aca27ab0929dadb992c1478a4fe40f2cc46056eb_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:35327c34974a9a064195116403c8c3bf725e0866973c94bf326b73d91d0560c1_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:5c4eac14e5fcdfa079d848501011bcc65a0f5fe056380ab5fa7ae89bac2796ed_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:69ed5692ef73bb6f700889df40d300aeb4d5b931b24d5b267dfc1a3ae81591e6_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:d30f0114dcbcf436bc2063894aeef28767640950fe8836f275f4d15912f22c13_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:11d7fa3b841b8af36bfb59039d663f21523268ae53e3727aedb3b731e2e8007b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:6c09d889e22b3684e343e37776d2ddaea943f00fa3440565e95a2a098c0e8ca5_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:c534370c7eaea7c3c99eb6efb10e3e35e0f563bb1e822a8ad9001edf9f4d699b_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:c9dc90710afc92487b5b8b5ba9dee955fdf881f11c7df7f8cff2b292bf36a8c9_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:567b55ec3d658b97611c5705b65c8a9a2f291aca755a391941f03fa67c775520_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9996d77e31cf4adf708c6866c2a3079e623c11539cdc26e05100898faadca31d_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a4682fed175f2a6eb0d6b75e2b1075358e814bb85b0a1d2ca71e253bf33c1f2b_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a503850af5234e9cda86a542473cee328da17d1088e9a68b71e899a08cff4f1b_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:03f598ff4299c16803575ecbcc57ce26763659526145da49c70dfb2cf9af53fe_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:16d96bcd4510853caf8219c5dda1e69a2bde44fe9d11c954e66e55f6cbb4a78c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:b71c59c917a854558b6a6066c81618d0c9cc245dd1e1ca68191de4c14675d1bc_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:e532ea5f84bc7c942b42e2f324fd2bafbcae7f4dc8f0e43d83741b36f5291a95_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:5d249467164c9c364cd4dbf8023b53411b2ecd1cb1330d4f1ab7868bdf851021_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:61189c337af540bc0bb10491e66de30fd7efb9b9536268d43aa638aeb96f18c4_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:7f53a3c60934312374ad2914ffba757ed5d0e869b4fb0502c75db9249593744e_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:98251b6070dc37425d775e22b7a22c7e51bb2d75d85f2ae1d4356c307b156748_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:03a1057b48a105964e3cd49b43e21b9e39717c618d031dfd4bd9e359e086d29c_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2d90d279d73845e9b04fb7a3289ce356c4f076dc6934e6b69b3b4ca575a2ff_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:6749e9748039c24278b1e49914be37b9f0eb0a231e25bf2943eaf5837a5fdbb0_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:dd78b0e868c1ec1602d91c95601cbfcd482ced9be766bdf27d58a9d8cf253dda_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:7f85ee855ee30ac22a1f1bd3757a2a9dff18a8aa8495810dc6b70b7a00d8d115_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:8049c3dcc7a3108c4be57168b215d2a837fd2ac13e97e04f005280aa45a3aa55_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:97cc35103eb35f218af98d983157ffb2f893333d68ca232411ab2fae88b90971_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:f46d8770dbf1c60fffaddb1630cbd4b3afd4dab9a4bc16c6f814d762ee2f6225_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:4140916af5904c58dcf636d6a80ccd180c9f7f417ade6de9b18a9d17b93e0f7a_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:baf330884101327732eca8f78fc65bae7fb34ac5faba8f93491d42de237a177c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:c922b2d36c86fe89e620eb288ce52904d6ff718154fc4ab9f54f117b847967a1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:ebd96dc01ab5c758a12084730ab144425d2d76f24dcd4bd8ac41f6052488398f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:03239302e7484ae4e7e915b2d2328e3eaed6ea9384486913f923b37eaabe8dd3_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:428934b9a6b8fb2d7143d568ddf4751bd760584e695df9524c3338ac52918b52_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:e04cae5b2bd55331fe04ae2aea8a1db34f68ddf6bf98ee08cd551b874cd9d4f7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:fbe0401ee2c60f07f9f3cea7ab5b2563f9035e609c39ae8e6e1e5aa80171ffe6_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:45084f59b43f0b380e661b82e338c8ccffedbfe59cd79034c40fcf9056ae422c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:5942bb085d89cb610ee023bbefe22ee375105a282d8b505d3f050bb5ce13c076_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:dfacaa2c151351ef08bd04fbe231d01d0fe191fab99cfc7994227bd1207b7146_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:efa95a5a96ecb8b47c1f03a0ee59adb19165494fe0c5e7fea7a6c379056f4ead_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:5b912b55233d31d8b11e5dcd764501e7d3677e6c16695e79e0626ea8052a4b1f_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:86039c1c04b1b2424d02b6a80890d0d5559a0d2821ea03441676e069fcd1d242_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:c4d7943c78a426f6284af594952bb007b6dcb00eeb8aa00908d1a0da8688aa4d_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:ea514a667518bc1cc7de8e9b3e34212e3576c6cad82ad36c3704b42c6d40d444_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:6b3933d68a7089d5f82a4c7a4223ce895ffddd8b38565a7fc9a9efc41e43fed1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:7d216b785359d81fedeeb33ebd214837a903ff301d2a4832418fe232f7bc1f21_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:f95c940003b1b1a21302ce165b2760348c2c47a7155d78daf4ee7eb409524142_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:fe2040c631ff796b5fc07517a3f2e4cf63e30e6cd170791fda4dc92971efc314_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:20a016b283e27f58633ee646c5c6c86feb9ad0f5fb6663de086186400b46621c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:62da20be3123fa6d814e7b7949751673559f87a951e89d2fcc408ceb50a8f52f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:b3663745add6e398f05c0328d430b5d4b0b7596fe7ad9dc66ad9120fb915e071_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:df909b7eb08718a1c917fd812357ec40835cab57a8e2b2f25d6d35f45e5b6ab8_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:23d7fdf8d30a2030c78bff04bda2208635a16b00481bb26cfdc270ccc4c0e68b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:930028ea4fe287a7f3c2ec59216725b8918c284db16fbb2bc6c2726b8bad6d36_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:d8ae1b34eff5e87770c42de001a5dfbeca526250d82a49acb6a6c2d014015422_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:e9e6736a93698c80fee0bf0338d5305d2154b1edf668d6a2dc88345aa91c5047_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:0ae5132a4a57e208a654374fe4489da16259d59e929ced2b4a7c216227774ea5_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:12d0c8d22b4233e101d40adf4af6a1dd05814d137070b5ffe12644e23975b9ef_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:c27f1f2e7aad3896ecce8b9bd2824ca06b83f5f5fd7b4406b2f6d1487b9da353_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:ce98b1afd8165d9f99e6d0bb542f4d84e5cbe3db242cea9dff09137274050ad9_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:061a7f9082146c8d30352986d83af4b18549f2a0447719e943b0f69fc20465a7_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:b110cc312114fcae5d85daa3671266c192f6315c3beaf3aafa8b16ae85ae6e8e_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:be27bde4cc9fe5ab30e9d0b2bd5b65724c23f4a2c6a774c70253b02a567b5e7f_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d4e41b4449e59290dcea64440e49eb09605faf15b3a4d3620591c610fd8cba76_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:64c65223d68e5470d9f94bba18986d6db4476ce58a12043a1c38b6fc57374bc4_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:71f1703a8394fcf7f957213545130b01a56b06e2aceb3d96852f9dbc0dc0d625_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:ae230b8ede9d4d3f1d8fad744c979518279cebe62e9d066bcc0691d3f1c0c019_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:fa420b9f08b8a8828a6625f53427690e1cab646088639b9f5f60b8f44623e723_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:2359ffdb8fdad57598a8405c3156f51f6e13898c137c2c26f8257fd112ed808f_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:4385a988f9cee63ff4df54d70347f4509acaf4d8e6fb6c7d7d7b58c634aec3f7_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:b56682e6b4d08a6992df430a0da878e7977027216776789e2887a110c28c3e2b_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:291cca7f9fb3ca1d0e353db4ff1478d598ee7ef3a24ada16be64c96482267e60_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:425d22934abc149c70946caac4800590ae26d0ec732b17b3140c3cf943afc1f8_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:a1a144538acd889a3a6382068b19e5ee8293294a8725f7c9e7918187ecdd282e_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:ccb53707ebf3a8295d4463e430b9fe901736d08105222630da9d415ba0779a76_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:530552bc7040af67f67af2828250a4ebabb6d9d528935c778b1d78c1dba817eb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:c8cb84783aad7439fb7ec9fb7118d15fff731e0df42ddd0d6cce9d0300e296f0_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:cad141cf8d10a7b251dab93ae23fe2be15847f68a040c0580bcc593ef25fc15c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:e65dc6c5996a11b328cc4950b821e4a00b2e3cf504e767992eca097bd0387f03_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:18dbe0d0c1e4be68c26db5ef17a2f11ebfceeda7077d0834426d62fcb0d0b703_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:32a74c4daafbc2812c146bd4cf8bb91a6e2751156b14dfbd00fcb0eab0d12d93_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:3584c7a2498f8d3714bd478ebf3561440dbead1c0058c21b7b137061782ac783_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:6ec0c37ea9f203f4fb95d2cdcfd7ab447f81f8401cd68531c03bf5d5fb5a5155_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:238ba8b48e163b71b84a6c960188aeff6c42226c176ce01441ff088aa62625bd_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:2be3dec184056c3f466456febc08b8ae8036814a33ce12aedeb32ff71d5cbab6_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:38af12a197029fa68baf34a6dc31dd1ed009b7257c547d582ad2ccc7d90bec5f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:f28e006870115a0f807fd6e7603dc3b5427d6aac9a7252c2f9821f40dd5cda63_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:013fdab49e3bf2a1130865cce36af33d090c8874338f17c529a7581226c34900_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:16712e3f1fc76fd958a8de9ac5c52c12d850d3632e2bd3f14c627c39972e6902_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:1d3327756a221735149cd26a6d5f0d80cc44e16b7c89ec6ccf665d930eb64012_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:743bf65b5a6369b6199e8e04749bbd56d7cdfe86baebb8fa009e78c087c7afba_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:1e620a945b98f982970118aed4b25331a8b4dba2ed4e879213a26f1976181cf7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:2c810af89c2198900c1605b1a02ab7870d6b8811e56b235d84628dacc6c45e15_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:aec214dbc01379ca8a14b1babdd209ce179da949ca95e4628be3480f4c422b78_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:d2069ea2e2e0afe955d179e265b30fe323c160af5354209a41ee78f28e95ecdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:000b11a47509f43f12061ecfc3595830e70d06686bf42b67ea0f3a8a4049ddec_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:28d013309629353d8439be41123c1cd7d2c007bd66be589fc7da66f180943dd7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:74ee51bbdfb3e06072ddba3d2d6f8afb9e07562660a7f97dca48627738402440_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:dd0c26976b4ed86d8b14aa0bf10aa56a484c38af721803e99248bbed85173b65_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:6c97acea30e0679b19b2d9b43c3a09f72571dfc28e5f736fe0299ab69014a6b4_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:b7c150e874c43418d35091154f768906eb0ad8dd3ed509465922c6ebb345769e_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:c10d4e4efda73c7c1867a13391e03d408762f1069a0c2a86375d9343b36f5410_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-image-service-rhel8@sha256:e45632049ee5e501773b03c3beaed3acc0e5d7345f8d816bbaa90192b12df724_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:0536793606065e327247ec850df060260246ea101985e62604dd5eb7c41f40b1_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:319f7238c812e6ccf020f3b665f88f8236a51ac7740b9d974b50110d7566dcda_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:520fd8238e60409bac8656b1b145ac5c91d20592965dbebdf8563a5129afe4ef_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-agent-rhel8@sha256:ab2d453fc966ddbc6a1a5012b5f70e4be84cd1de739c8b6789ff58288042daec_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:3ae4da39ce451793b88d2aaf68a963273642ca967189e477820ac4bf3db3718d_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:521143779c55b600e9473b24ffb1361672d5d5cbaea2a22a5564645fd3437ec0_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:737eb30b5ae839e6670cc26303b660b0875ae1eeed6438eae1ff03ed1e011bdb_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-controller-rhel8@sha256:eb939c5a630413bcf64f633801a65b9c921f4357ac41ddf52492bbb827957c66_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:2b6ac6ac869393a975f18d57b8b672ce5fb44227c70a1ee9b4c3e9a45b66cf58_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:3d7e94bcd1ea27ebb3c786053a53ff6c5b280b666996378f446ef3b5a045b09f_ppc64le",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:be8d9a854480bda62e5aee71c629139ab73560f0b4020c562b9865012202c0ec_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-installer-rhel8@sha256:e7a270f405cbfe594680d7103b8a59b1de442e65fc6c70590b735b0acd24edc0_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:4ccdd963c97fab0d30058433ba1aad54a69dc9965b57f0f117b7885ca495aedd_amd64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:b1aa30670a0169ff6833fdfef04f383177aa19d2805a361d848e5196f2d4dad9_arm64",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:bb8ce76de216a8cc25d59bf8e7605efc298f2a198c60324ba17cdf89be20b6c1_s390x",
"8Base-multicluster-engine-2.6:multicluster-engine/assisted-service-8-rhel8@sha256:c45da32cba975301e6bae6a68a07b89776309e2933c493b3d31adcf01e102273_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:28bc6bf67308e3a9d672602b2c01767c80f6b821c458c2d3d933869741ac879d_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:a5cb6bff2d64bbebc5ddcc2cc44481acf545e92cf52b4acf28588e64e2f33d7d_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:d6533bb8ee76ebc8554d086c5a9e802d1507e12b7d75c98692978421f743c903_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/addon-manager-rhel9@sha256:ed2070762f058659c7c57b96aca27ab0929dadb992c1478a4fe40f2cc46056eb_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:35327c34974a9a064195116403c8c3bf725e0866973c94bf326b73d91d0560c1_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:5c4eac14e5fcdfa079d848501011bcc65a0f5fe056380ab5fa7ae89bac2796ed_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:69ed5692ef73bb6f700889df40d300aeb4d5b931b24d5b267dfc1a3ae81591e6_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/assisted-service-9-rhel9@sha256:d30f0114dcbcf436bc2063894aeef28767640950fe8836f275f4d15912f22c13_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:11d7fa3b841b8af36bfb59039d663f21523268ae53e3727aedb3b731e2e8007b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:6c09d889e22b3684e343e37776d2ddaea943f00fa3440565e95a2a098c0e8ca5_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:c534370c7eaea7c3c99eb6efb10e3e35e0f563bb1e822a8ad9001edf9f4d699b_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/backplane-rhel9-operator@sha256:c9dc90710afc92487b5b8b5ba9dee955fdf881f11c7df7f8cff2b292bf36a8c9_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:567b55ec3d658b97611c5705b65c8a9a2f291aca755a391941f03fa67c775520_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9996d77e31cf4adf708c6866c2a3079e623c11539cdc26e05100898faadca31d_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a4682fed175f2a6eb0d6b75e2b1075358e814bb85b0a1d2ca71e253bf33c1f2b_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:a503850af5234e9cda86a542473cee328da17d1088e9a68b71e899a08cff4f1b_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:03f598ff4299c16803575ecbcc57ce26763659526145da49c70dfb2cf9af53fe_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:16d96bcd4510853caf8219c5dda1e69a2bde44fe9d11c954e66e55f6cbb4a78c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:b71c59c917a854558b6a6066c81618d0c9cc245dd1e1ca68191de4c14675d1bc_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-api-rhel9@sha256:e532ea5f84bc7c942b42e2f324fd2bafbcae7f4dc8f0e43d83741b36f5291a95_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:5d249467164c9c364cd4dbf8023b53411b2ecd1cb1330d4f1ab7868bdf851021_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:61189c337af540bc0bb10491e66de30fd7efb9b9536268d43aa638aeb96f18c4_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:7f53a3c60934312374ad2914ffba757ed5d0e869b4fb0502c75db9249593744e_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-curator-controller-rhel9@sha256:98251b6070dc37425d775e22b7a22c7e51bb2d75d85f2ae1d4356c307b156748_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:03a1057b48a105964e3cd49b43e21b9e39717c618d031dfd4bd9e359e086d29c_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2d90d279d73845e9b04fb7a3289ce356c4f076dc6934e6b69b3b4ca575a2ff_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:6749e9748039c24278b1e49914be37b9f0eb0a231e25bf2943eaf5837a5fdbb0_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-image-set-controller-rhel9@sha256:dd78b0e868c1ec1602d91c95601cbfcd482ced9be766bdf27d58a9d8cf253dda_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:7f85ee855ee30ac22a1f1bd3757a2a9dff18a8aa8495810dc6b70b7a00d8d115_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:8049c3dcc7a3108c4be57168b215d2a837fd2ac13e97e04f005280aa45a3aa55_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:97cc35103eb35f218af98d983157ffb2f893333d68ca232411ab2fae88b90971_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-addon-rhel9@sha256:f46d8770dbf1c60fffaddb1630cbd4b3afd4dab9a4bc16c6f814d762ee2f6225_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:4140916af5904c58dcf636d6a80ccd180c9f7f417ade6de9b18a9d17b93e0f7a_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:baf330884101327732eca8f78fc65bae7fb34ac5faba8f93491d42de237a177c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:c922b2d36c86fe89e620eb288ce52904d6ff718154fc4ab9f54f117b847967a1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/cluster-proxy-rhel9@sha256:ebd96dc01ab5c758a12084730ab144425d2d76f24dcd4bd8ac41f6052488398f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:03239302e7484ae4e7e915b2d2328e3eaed6ea9384486913f923b37eaabe8dd3_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:428934b9a6b8fb2d7143d568ddf4751bd760584e695df9524c3338ac52918b52_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:e04cae5b2bd55331fe04ae2aea8a1db34f68ddf6bf98ee08cd551b874cd9d4f7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterclaims-controller-rhel9@sha256:fbe0401ee2c60f07f9f3cea7ab5b2563f9035e609c39ae8e6e1e5aa80171ffe6_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:45084f59b43f0b380e661b82e338c8ccffedbfe59cd79034c40fcf9056ae422c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:5942bb085d89cb610ee023bbefe22ee375105a282d8b505d3f050bb5ce13c076_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:dfacaa2c151351ef08bd04fbe231d01d0fe191fab99cfc7994227bd1207b7146_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:efa95a5a96ecb8b47c1f03a0ee59adb19165494fe0c5e7fea7a6c379056f4ead_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:5b912b55233d31d8b11e5dcd764501e7d3677e6c16695e79e0626ea8052a4b1f_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:86039c1c04b1b2424d02b6a80890d0d5559a0d2821ea03441676e069fcd1d242_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:c4d7943c78a426f6284af594952bb007b6dcb00eeb8aa00908d1a0da8688aa4d_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/discovery-rhel9@sha256:ea514a667518bc1cc7de8e9b3e34212e3576c6cad82ad36c3704b42c6d40d444_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:6b3933d68a7089d5f82a4c7a4223ce895ffddd8b38565a7fc9a9efc41e43fed1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:7d216b785359d81fedeeb33ebd214837a903ff301d2a4832418fe232f7bc1f21_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:f95c940003b1b1a21302ce165b2760348c2c47a7155d78daf4ee7eb409524142_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hive-rhel9@sha256:fe2040c631ff796b5fc07517a3f2e4cf63e30e6cd170791fda4dc92971efc314_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:20a016b283e27f58633ee646c5c6c86feb9ad0f5fb6663de086186400b46621c_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:62da20be3123fa6d814e7b7949751673559f87a951e89d2fcc408ceb50a8f52f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:b3663745add6e398f05c0328d430b5d4b0b7596fe7ad9dc66ad9120fb915e071_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-cli-rhel9@sha256:df909b7eb08718a1c917fd812357ec40835cab57a8e2b2f25d6d35f45e5b6ab8_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:23d7fdf8d30a2030c78bff04bda2208635a16b00481bb26cfdc270ccc4c0e68b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:930028ea4fe287a7f3c2ec59216725b8918c284db16fbb2bc6c2726b8bad6d36_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:d8ae1b34eff5e87770c42de001a5dfbeca526250d82a49acb6a6c2d014015422_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/hypershift-rhel9-operator@sha256:e9e6736a93698c80fee0bf0338d5305d2154b1edf668d6a2dc88345aa91c5047_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:0ae5132a4a57e208a654374fe4489da16259d59e929ced2b4a7c216227774ea5_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:12d0c8d22b4233e101d40adf4af6a1dd05814d137070b5ffe12644e23975b9ef_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:c27f1f2e7aad3896ecce8b9bd2824ca06b83f5f5fd7b4406b2f6d1487b9da353_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/image-based-install-rhel9@sha256:ce98b1afd8165d9f99e6d0bb542f4d84e5cbe3db242cea9dff09137274050ad9_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:061a7f9082146c8d30352986d83af4b18549f2a0447719e943b0f69fc20465a7_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:b110cc312114fcae5d85daa3671266c192f6315c3beaf3aafa8b16ae85ae6e8e_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:be27bde4cc9fe5ab30e9d0b2bd5b65724c23f4a2c6a774c70253b02a567b5e7f_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d4e41b4449e59290dcea64440e49eb09605faf15b3a4d3620591c610fd8cba76_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:64c65223d68e5470d9f94bba18986d6db4476ce58a12043a1c38b6fc57374bc4_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:71f1703a8394fcf7f957213545130b01a56b06e2aceb3d96852f9dbc0dc0d625_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:ae230b8ede9d4d3f1d8fad744c979518279cebe62e9d066bcc0691d3f1c0c019_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/managedcluster-import-controller-rhel9@sha256:fa420b9f08b8a8828a6625f53427690e1cab646088639b9f5f60b8f44623e723_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:2359ffdb8fdad57598a8405c3156f51f6e13898c137c2c26f8257fd112ed808f_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:4385a988f9cee63ff4df54d70347f4509acaf4d8e6fb6c7d7d7b58c634aec3f7_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/mce-operator-bundle@sha256:b56682e6b4d08a6992df430a0da878e7977027216776789e2887a110c28c3e2b_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:291cca7f9fb3ca1d0e353db4ff1478d598ee7ef3a24ada16be64c96482267e60_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:425d22934abc149c70946caac4800590ae26d0ec732b17b3140c3cf943afc1f8_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:a1a144538acd889a3a6382068b19e5ee8293294a8725f7c9e7918187ecdd282e_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicloud-manager-rhel9@sha256:ccb53707ebf3a8295d4463e430b9fe901736d08105222630da9d415ba0779a76_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:12e12b2faa0c4ee19bec9596e68c92bc887ed2f0cc6ffe424d72f07f1c38eae0_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:85bfec04c2cb54b03791a0e1f794a6a3ea83e14325572dcb15e1092cd023874b_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:d52e2ca944dbfe5accfde584f1dec89f146233879345a514cc958a234fc15b1c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel9@sha256:fd3786744f5409a48a01fe8db011b07ad26a54f0df9f00bd407e617aaca242e8_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:27e041e27baca32abb9b48bef5979022ceec8638821e9800fa5ab9d1bb755e8b_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:360cbf61c52e8f0492e9c1f88a0bced65b01696b79149dc54f3c4cac56560cb2_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:a2b6478d124cacfd644d66ee3e094dab80938639b11868fb1083b3197e448bdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-console-mce-rhel9@sha256:e29abe9c1759fc384d9dacf8934bccdad093367f66b717fbe78af25fd9d15373_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:3de9fb01408188efed8fe75bc06a4e4f6044577062138e7269fd46c9d4cc299e_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:46eec955cbb1c987dd11c947399f6e585bc3e91ee800e5527c3c6ff31bd211fb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:57c4ffa82641a096f7cd0ac59272684d57f48a37ea72aa03c788ecdc26fa25ac_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-hypershift-addon-rhel9-operator@sha256:6909f50fb9c4810890a4687d07dad493f2ef1bd411ecfecb624720d5fa98c099_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:022a9a24cd90f49b117197e270d934f82d0f548b52696ad99d179e80a2f7db91_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:6947a39a4c10666b6b6391abe1c7ed1058b1db08624db73ec4779be32e5474f1_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:8ccdfbdb6f9572b2e0e34700912b38fa0104f9029956d05096e652b1748c3416_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel9@sha256:e1f39353c0c5dd081baca760be902ffc16e1718e00c2d57cab46b989949e1412_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:530552bc7040af67f67af2828250a4ebabb6d9d528935c778b1d78c1dba817eb_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:c8cb84783aad7439fb7ec9fb7118d15fff731e0df42ddd0d6cce9d0300e296f0_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:cad141cf8d10a7b251dab93ae23fe2be15847f68a040c0580bcc593ef25fc15c_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/must-gather-rhel9@sha256:e65dc6c5996a11b328cc4950b821e4a00b2e3cf504e767992eca097bd0387f03_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:18dbe0d0c1e4be68c26db5ef17a2f11ebfceeda7077d0834426d62fcb0d0b703_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:32a74c4daafbc2812c146bd4cf8bb91a6e2751156b14dfbd00fcb0eab0d12d93_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:3584c7a2498f8d3714bd478ebf3561440dbead1c0058c21b7b137061782ac783_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/placement-rhel9@sha256:6ec0c37ea9f203f4fb95d2cdcfd7ab447f81f8401cd68531c03bf5d5fb5a5155_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:238ba8b48e163b71b84a6c960188aeff6c42226c176ce01441ff088aa62625bd_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:2be3dec184056c3f466456febc08b8ae8036814a33ce12aedeb32ff71d5cbab6_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:38af12a197029fa68baf34a6dc31dd1ed009b7257c547d582ad2ccc7d90bec5f_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/provider-credential-controller-rhel9@sha256:f28e006870115a0f807fd6e7603dc3b5427d6aac9a7252c2f9821f40dd5cda63_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:013fdab49e3bf2a1130865cce36af33d090c8874338f17c529a7581226c34900_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:16712e3f1fc76fd958a8de9ac5c52c12d850d3632e2bd3f14c627c39972e6902_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:1d3327756a221735149cd26a6d5f0d80cc44e16b7c89ec6ccf665d930eb64012_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-operator-rhel9@sha256:743bf65b5a6369b6199e8e04749bbd56d7cdfe86baebb8fa009e78c087c7afba_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:1e620a945b98f982970118aed4b25331a8b4dba2ed4e879213a26f1976181cf7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:2c810af89c2198900c1605b1a02ab7870d6b8811e56b235d84628dacc6c45e15_s390x",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:aec214dbc01379ca8a14b1babdd209ce179da949ca95e4628be3480f4c422b78_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/registration-rhel9@sha256:d2069ea2e2e0afe955d179e265b30fe323c160af5354209a41ee78f28e95ecdf_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:000b11a47509f43f12061ecfc3595830e70d06686bf42b67ea0f3a8a4049ddec_arm64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:28d013309629353d8439be41123c1cd7d2c007bd66be589fc7da66f180943dd7_ppc64le",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:74ee51bbdfb3e06072ddba3d2d6f8afb9e07562660a7f97dca48627738402440_amd64",
"9Base-multicluster-engine-2.6:multicluster-engine/work-rhel9@sha256:dd0c26976b4ed86d8b14aa0bf10aa56a484c38af721803e99248bbed85173b65_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
}
]
}
RHSA-2023:5360
Vulnerability from csaf_redhat - Published: 2023-09-26 14:59 - Updated: 2026-04-01 18:53A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.
A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.
A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding('spawn_sync') to run arbitrary code outside of the limits defined in a policy.json file.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (16). (BZ#2233891)\n\nSecurity Fix(es):\n\n* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)\n\n* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:16/nodejs: nodejs.prov doesn\u0027t generate the bundled dependency for modules starting @ like @colors/colors (BZ#2237394)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5360",
"url": "https://access.redhat.com/errata/RHSA-2023:5360"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "2230948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948"
},
{
"category": "external",
"summary": "2230955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955"
},
{
"category": "external",
"summary": "2230956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956"
},
{
"category": "external",
"summary": "2233891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233891"
},
{
"category": "external",
"summary": "2237394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237394"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5360.json"
}
],
"title": "Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2026-04-01T18:53:34+00:00",
"generator": {
"date": "2026-04-01T18:53:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:5360",
"initial_release_date": "2023-09-26T14:59:37+00:00",
"revision_history": [
{
"date": "2023-09-26T14:59:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-09-26T14:59:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:53:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product": {
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16)",
"product_id": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16)",
"product_id": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16)",
"product_id": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16)",
"product_id": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16)",
"product_id": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16)",
"product_id": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"product": {
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src (nodejs:16)",
"product_id": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=src\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src (nodejs:16)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.8.0%2B19764%2B7eed1ca3?arch=src\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"product": {
"name": "nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src (nodejs:16)",
"product_id": "nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@26-1.module%2Bel8.8.0%2B19857%2B6d2a104d?arch=src\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"product": {
"name": "nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch (nodejs:16)",
"product_id": "nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch (nodejs:16)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.8.0%2B19764%2B7eed1ca3?arch=noarch\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"product": {
"name": "nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch (nodejs:16)",
"product_id": "nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@26-1.module%2Bel8.8.0%2B19857%2B6d2a104d?arch=noarch\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product": {
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16)",
"product_id": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16)",
"product_id": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16)",
"product_id": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16)",
"product_id": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16)",
"product_id": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16)",
"product_id": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product": {
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16)",
"product_id": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16)",
"product_id": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16)",
"product_id": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16)",
"product_id": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16)",
"product_id": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16)",
"product_id": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product": {
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16)",
"product_id": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16)",
"product_id": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16)",
"product_id": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16)",
"product_id": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16)",
"product_id": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16)",
"product_id": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.8.0%2B19898%2Bab99ba34?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8080020230906092006:63b34585"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16"
},
"product_reference": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16"
},
"product_reference": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16"
},
"product_reference": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16"
},
"product_reference": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
},
"product_reference": "nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16"
},
"product_reference": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16"
},
"product_reference": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16"
},
"product_reference": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
},
"product_reference": "nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16"
},
"product_reference": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16"
},
"product_reference": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16"
},
"product_reference": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
},
"product_reference": "nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16"
},
"product_reference": "nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16"
},
"product_reference": "nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16"
},
"product_reference": "nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:59:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5360"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2023-32002",
"cwe": {
"id": "CWE-1268",
"name": "Policy Privileges are not Assigned Consistently Between Control and Data Agents"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230948"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can be bypassed via Module._load",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important instead of Critical because it only impacts users of the policy mechanism that must be explicitly enabled using the `--experimental-policy` flag. This is not enabled by default.\n\nRed Hat\u0027s Secure Software Development Life Cycle utilizes a layered testing approach. This significantly increases attack complexity, because a compromised package must remain undetected for months to years in testing in upstream communities before it could be adopted into a Red Hat product. This long dwell-time reduces impact to Important.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32002"
},
{
"category": "external",
"summary": "RHBZ#2230948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:59:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5360"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Permissions policies can be bypassed via Module._load"
},
{
"cve": "CVE-2023-32006",
"cwe": {
"id": "CWE-213",
"name": "Exposure of Sensitive Information Due to Incompatible Policies"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230955"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32006"
},
{
"category": "external",
"summary": "RHBZ#2230955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:59:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5360"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()"
},
{
"cve": "CVE-2023-32559",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230956"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(\u0027spawn_sync\u0027) to run arbitrary code outside of the limits defined in a policy.json file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can be bypassed via process.binding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "When this CVE was reported, the policy.json file was still experimental in nature and not deployed and widely in environments,which is why at the time when this CVE was submitted,Redhat chose to classify this as moderare.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32559"
},
{
"category": "external",
"summary": "RHBZ#2230956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:59:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5360"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19764+7eed1ca3.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.noarch::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:26-1.module+el8.8.0+19857+6d2a104d.src::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.aarch64::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.ppc64le::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.s390x::nodejs:16",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Permissions policies can be bypassed via process.binding"
}
]
}
RHSA-2023:5484
Vulnerability from csaf_redhat - Published: 2023-10-05 20:23 - Updated: 2026-04-01 18:45A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.
A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.
A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.
A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.
A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.
A flaw was found in Netty's SniHandler while navigating TLS handshake which may permit a large heap allocation if the handler did not have a timeout configured. This issue may allow an attacker to send a client hello packet which would cause the server to buffer large amounts of data per connection, potentially causing an out of memory error, resulting in Denial of Service.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* server: eap-7: heap exhaustion via deserialization (CVE-2023-3171)\n\n* log4j: log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging (CVE-2023-26464)\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor (CVE-2023-4061)\n\n* tough-cookie: prototype pollution in cookie memstore (CVE-2023-26136)\n\n* bouncycastle: potential blind LDAP injection attack using a self-signed certificate (CVE-2023-33201)\n\n* netty: netty-handler: SniHandler 16MB allocation (CVE-2023-34462)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5484",
"url": "https://access.redhat.com/errata/RHSA-2023:5484"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
},
{
"category": "external",
"summary": "2182864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864"
},
{
"category": "external",
"summary": "2213639",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639"
},
{
"category": "external",
"summary": "2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "2228608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228608"
},
{
"category": "external",
"summary": "JBEAP-24667",
"url": "https://issues.redhat.com/browse/JBEAP-24667"
},
{
"category": "external",
"summary": "JBEAP-24797",
"url": "https://issues.redhat.com/browse/JBEAP-24797"
},
{
"category": "external",
"summary": "JBEAP-24966",
"url": "https://issues.redhat.com/browse/JBEAP-24966"
},
{
"category": "external",
"summary": "JBEAP-24985",
"url": "https://issues.redhat.com/browse/JBEAP-24985"
},
{
"category": "external",
"summary": "JBEAP-25032",
"url": "https://issues.redhat.com/browse/JBEAP-25032"
},
{
"category": "external",
"summary": "JBEAP-25033",
"url": "https://issues.redhat.com/browse/JBEAP-25033"
},
{
"category": "external",
"summary": "JBEAP-25078",
"url": "https://issues.redhat.com/browse/JBEAP-25078"
},
{
"category": "external",
"summary": "JBEAP-25122",
"url": "https://issues.redhat.com/browse/JBEAP-25122"
},
{
"category": "external",
"summary": "JBEAP-25135",
"url": "https://issues.redhat.com/browse/JBEAP-25135"
},
{
"category": "external",
"summary": "JBEAP-25186",
"url": "https://issues.redhat.com/browse/JBEAP-25186"
},
{
"category": "external",
"summary": "JBEAP-25200",
"url": "https://issues.redhat.com/browse/JBEAP-25200"
},
{
"category": "external",
"summary": "JBEAP-25225",
"url": "https://issues.redhat.com/browse/JBEAP-25225"
},
{
"category": "external",
"summary": "JBEAP-25261",
"url": "https://issues.redhat.com/browse/JBEAP-25261"
},
{
"category": "external",
"summary": "JBEAP-25285",
"url": "https://issues.redhat.com/browse/JBEAP-25285"
},
{
"category": "external",
"summary": "JBEAP-25312",
"url": "https://issues.redhat.com/browse/JBEAP-25312"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5484.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update on RHEL 7",
"tracking": {
"current_release_date": "2026-04-01T18:45:43+00:00",
"generator": {
"date": "2026-04-01T18:45:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:5484",
"initial_release_date": "2023-10-05T20:23:52+00:00",
"revision_history": [
{
"date": "2023-10-05T20:23:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-05T20:23:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:45:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"product_id": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.26-1.SP1_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.20-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.13-2.SP1_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.94-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.8.10-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.8-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-31.Final_redhat_00030.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-mod_cluster@1.4.5-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.31-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.19-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.15-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-modules@1.12.2-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"product": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"product_id": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis@2.16.0-15.redhat_00049.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"product_id": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle@1.76.0-4.redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.94-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"product_id": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.13-8.GA_redhat_00001.1.el7eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.26-1.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.20-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.15.20-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.13-2.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling-river@2.0.13-2.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-rxtx@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-udt@4.1.94-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.8.10-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-31.Final_redhat_00030.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-31.Final_redhat_00030.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-31.Final_redhat_00030.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-mod_cluster@1.4.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.31-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-core@5.3.31-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-entitymanager@5.3.31-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-envers@5.3.31-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-java8@5.3.31-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.19-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.15-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.15-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.15-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.15-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.15-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.15-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.15-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.15-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.15-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-modules@1.12.2-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-cli@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-commons@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-core-client@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-dto@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-hornetq-protocol@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-hqclient-protocol@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jdbc-store@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jms-client@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jms-server@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-journal@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-ra@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-selector@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-server@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-service-extensions@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-tools@2.16.0-15.redhat_00049.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle@1.76.0-4.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-mail@1.76.0-4.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-pg@1.76.0-4.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-pkix@1.76.0-4.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-prov@1.76.0-4.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-util@1.76.0-4.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.13-8.GA_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.13-8.GA_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.13-8.GA_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.13-8.GA_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.13-8.GA_redhat_00001.1.el7eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.94-1.Final_redhat_00001.1.el7eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.94-1.Final_redhat_00001.1.el7eap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src"
},
"product_reference": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:23:52+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5484"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2023-3171",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"discovery_date": "2023-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2213639"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "eap-7: heap exhaustion via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3171"
},
{
"category": "external",
"summary": "RHBZ#2213639",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:23:52+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5484"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "eap-7: heap exhaustion via deserialization"
},
{
"cve": "CVE-2023-4061",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228608"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability requires a malicious user to previously have access to the system, especially access to the HAL interface via browser and logged with a management user who have access to the resolve-expression method, hence the moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-4061"
},
{
"category": "external",
"summary": "RHBZ#2228608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228608"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-4061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4061"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-4061",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4061"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:23:52+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5484"
},
{
"category": "workaround",
"details": "Wildfly administrators are recommended to use Vault, especially the Elytron subsystem, to store potential critical information such as DNS, IPs, and credentials.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor"
},
{
"acknowledgments": [
{
"names": [
"Kokorin Vsevolod"
]
}
],
"cve": "CVE-2023-26136",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2023-07-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219310"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tough-cookie: prototype pollution in cookie memstore",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26136"
},
{
"category": "external",
"summary": "RHBZ#2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e",
"url": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/issues/282",
"url": "https://github.com/salesforce/tough-cookie/issues/282"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3",
"url": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3"
},
{
"category": "external",
"summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873",
"url": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873"
}
],
"release_date": "2023-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:23:52+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5484"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tough-cookie: prototype pollution in cookie memstore"
},
{
"cve": "CVE-2023-26464",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-03-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2182864"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "log4j1-socketappender: DoS via hashmap logging",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8 and 9 security impacts have been reduced to Low as they do not enable the vulnerable JDK by default.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26464"
},
{
"category": "external",
"summary": "RHBZ#2182864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464"
},
{
"category": "external",
"summary": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464",
"url": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464"
}
],
"release_date": "2023-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:23:52+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5484"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "log4j1-socketappender: DoS via hashmap logging"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-33201"
},
{
"category": "external",
"summary": "RHBZ#2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201"
},
{
"category": "external",
"summary": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:23:52+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5484"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate"
},
{
"cve": "CVE-2023-34462",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216888"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SniHandler while navigating TLS handshake which may permit a large heap allocation if the handler did not have a timeout configured. This issue may allow an attacker to send a client hello packet which would cause the server to buffer large amounts of data per connection, potentially causing an out of memory error, resulting in Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: SniHandler 16MB allocation leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34462"
},
{
"category": "external",
"summary": "RHBZ#2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462"
}
],
"release_date": "2023-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:23:52+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5484"
},
{
"category": "workaround",
"details": "Configuration of SniHandler with an idle timeout will mitigate this issue.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: SniHandler 16MB allocation leads to OOM"
}
]
}
RHSA-2023:5362
Vulnerability from csaf_redhat - Published: 2023-09-26 15:05 - Updated: 2026-04-01 18:53A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.
A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.
A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding('spawn_sync') to run arbitrary code outside of the limits defined in a policy.json file.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (18). (BZ#2234409)\n\nSecurity Fix(es):\n\n* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)\n\n* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5362",
"url": "https://access.redhat.com/errata/RHSA-2023:5362"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "2230948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948"
},
{
"category": "external",
"summary": "2230955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955"
},
{
"category": "external",
"summary": "2230956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956"
},
{
"category": "external",
"summary": "2234409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5362.json"
}
],
"title": "Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2026-04-01T18:53:32+00:00",
"generator": {
"date": "2026-04-01T18:53:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:5362",
"initial_release_date": "2023-09-26T15:05:53+00:00",
"revision_history": [
{
"date": "2023-09-26T15:05:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-09-26T15:05:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:53:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"product": {
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src (nodejs:18)",
"product_id": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=src\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src (nodejs:18)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=src\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"product": {
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src (nodejs:18)",
"product_id": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.7.0%2B15582%2B19c314fa?arch=src\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product": {
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18)",
"product_id": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18)",
"product_id": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18)",
"product_id": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.6.7-1.18.17.1.1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"product": {
"name": "nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch (nodejs:18)",
"product_id": "nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch (nodejs:18)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=noarch\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"product": {
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch (nodejs:18)",
"product_id": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.7.0%2B15582%2B19c314fa?arch=noarch\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"product": {
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch (nodejs:18)",
"product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel8.7.0%2B15582%2B19c314fa?arch=noarch\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product": {
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18)",
"product_id": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18)",
"product_id": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18)",
"product_id": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.6.7-1.18.17.1.1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product": {
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18)",
"product_id": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18)",
"product_id": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18)",
"product_id": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.6.7-1.18.17.1.1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product": {
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18)",
"product_id": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18)",
"product_id": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18)",
"product_id": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product": {
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18)",
"product_id": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18)",
"product_id": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@18.17.1-1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
},
{
"category": "product_version",
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18)",
"product_id": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@9.6.7-1.18.17.1.1.module%2Bel8.8.0%2B19757%2B8ca87034?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8080020230825111344:63b34585"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18"
},
"product_reference": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18"
},
"product_reference": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18"
},
"product_reference": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18"
},
"product_reference": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
},
"product_reference": "nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
},
"product_reference": "nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
},
"product_reference": "nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
},
"product_reference": "nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18"
},
"product_reference": "nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
},
"product_reference": "nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18"
},
"product_reference": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18"
},
"product_reference": "nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18"
},
"product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18"
},
"product_reference": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18"
},
"product_reference": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18"
},
"product_reference": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
},
"product_reference": "npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T15:05:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5362"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2023-32002",
"cwe": {
"id": "CWE-1268",
"name": "Policy Privileges are not Assigned Consistently Between Control and Data Agents"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230948"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can be bypassed via Module._load",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important instead of Critical because it only impacts users of the policy mechanism that must be explicitly enabled using the `--experimental-policy` flag. This is not enabled by default.\n\nRed Hat\u0027s Secure Software Development Life Cycle utilizes a layered testing approach. This significantly increases attack complexity, because a compromised package must remain undetected for months to years in testing in upstream communities before it could be adopted into a Red Hat product. This long dwell-time reduces impact to Important.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32002"
},
{
"category": "external",
"summary": "RHBZ#2230948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T15:05:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5362"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Permissions policies can be bypassed via Module._load"
},
{
"cve": "CVE-2023-32006",
"cwe": {
"id": "CWE-213",
"name": "Exposure of Sensitive Information Due to Incompatible Policies"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230955"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32006"
},
{
"category": "external",
"summary": "RHBZ#2230955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T15:05:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5362"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()"
},
{
"cve": "CVE-2023-32559",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230956"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(\u0027spawn_sync\u0027) to run arbitrary code outside of the limits defined in a policy.json file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can be bypassed via process.binding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "When this CVE was reported, the policy.json file was still experimental in nature and not deployed and widely in environments,which is why at the time when this CVE was submitted,Redhat chose to classify this as moderare.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32559"
},
{
"category": "external",
"summary": "RHBZ#2230956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T15:05:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5362"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-debugsource-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-devel-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-docs-1:18.17.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.17.1-1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.8.0+19757+8ca87034.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el8.7.0+15582+19c314fa.src::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el8.7.0+15582+19c314fa.noarch::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.aarch64::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.ppc64le::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.s390x::nodejs:18",
"AppStream-8.8.0.Z.MAIN.EUS:npm-1:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034.x86_64::nodejs:18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Permissions policies can be bypassed via process.binding"
}
]
}
RHSA-2023:5488
Vulnerability from csaf_redhat - Published: 2023-10-05 20:18 - Updated: 2026-04-01 18:45A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.
A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.
A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.
A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.
A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.
A flaw was found in Netty's SniHandler while navigating TLS handshake which may permit a large heap allocation if the handler did not have a timeout configured. This issue may allow an attacker to send a client hello packet which would cause the server to buffer large amounts of data per connection, potentially causing an out of memory error, resulting in Denial of Service.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* server: eap-7: heap exhaustion via deserialization (CVE-2023-3171)\n\n* log4j: log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging (CVE-2023-26464)\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor (CVE-2023-4061)\n\n* tough-cookie: prototype pollution in cookie memstore (CVE-2023-26136)\n\n* bouncycastle: potential blind LDAP injection attack using a self-signed certificate (CVE-2023-33201)\n\n* netty: netty-handler: SniHandler 16MB allocation (CVE-2023-34462)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5488",
"url": "https://access.redhat.com/errata/RHSA-2023:5488"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=7.4",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2182864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864"
},
{
"category": "external",
"summary": "2213639",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639"
},
{
"category": "external",
"summary": "2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "2228608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228608"
},
{
"category": "external",
"summary": "JBEAP-24667",
"url": "https://issues.redhat.com/browse/JBEAP-24667"
},
{
"category": "external",
"summary": "JBEAP-24966",
"url": "https://issues.redhat.com/browse/JBEAP-24966"
},
{
"category": "external",
"summary": "JBEAP-24985",
"url": "https://issues.redhat.com/browse/JBEAP-24985"
},
{
"category": "external",
"summary": "JBEAP-25032",
"url": "https://issues.redhat.com/browse/JBEAP-25032"
},
{
"category": "external",
"summary": "JBEAP-25033",
"url": "https://issues.redhat.com/browse/JBEAP-25033"
},
{
"category": "external",
"summary": "JBEAP-25078",
"url": "https://issues.redhat.com/browse/JBEAP-25078"
},
{
"category": "external",
"summary": "JBEAP-25122",
"url": "https://issues.redhat.com/browse/JBEAP-25122"
},
{
"category": "external",
"summary": "JBEAP-25135",
"url": "https://issues.redhat.com/browse/JBEAP-25135"
},
{
"category": "external",
"summary": "JBEAP-25186",
"url": "https://issues.redhat.com/browse/JBEAP-25186"
},
{
"category": "external",
"summary": "JBEAP-25200",
"url": "https://issues.redhat.com/browse/JBEAP-25200"
},
{
"category": "external",
"summary": "JBEAP-25225",
"url": "https://issues.redhat.com/browse/JBEAP-25225"
},
{
"category": "external",
"summary": "JBEAP-25261",
"url": "https://issues.redhat.com/browse/JBEAP-25261"
},
{
"category": "external",
"summary": "JBEAP-25285",
"url": "https://issues.redhat.com/browse/JBEAP-25285"
},
{
"category": "external",
"summary": "JBEAP-25312",
"url": "https://issues.redhat.com/browse/JBEAP-25312"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5488.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update",
"tracking": {
"current_release_date": "2026-04-01T18:45:44+00:00",
"generator": {
"date": "2026-04-01T18:45:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:5488",
"initial_release_date": "2023-10-05T20:18:28+00:00",
"revision_history": [
{
"date": "2023-10-05T20:18:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-23T22:34:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:45:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product_id": "Red Hat JBoss Enterprise Application Platform 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:18:28+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5488"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2023-3171",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"discovery_date": "2023-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2213639"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "eap-7: heap exhaustion via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3171"
},
{
"category": "external",
"summary": "RHBZ#2213639",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:18:28+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5488"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "eap-7: heap exhaustion via deserialization"
},
{
"cve": "CVE-2023-4061",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228608"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability requires a malicious user to previously have access to the system, especially access to the HAL interface via browser and logged with a management user who have access to the resolve-expression method, hence the moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-4061"
},
{
"category": "external",
"summary": "RHBZ#2228608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228608"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-4061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4061"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-4061",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4061"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:18:28+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5488"
},
{
"category": "workaround",
"details": "Wildfly administrators are recommended to use Vault, especially the Elytron subsystem, to store potential critical information such as DNS, IPs, and credentials.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor"
},
{
"acknowledgments": [
{
"names": [
"Kokorin Vsevolod"
]
}
],
"cve": "CVE-2023-26136",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2023-07-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219310"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tough-cookie: prototype pollution in cookie memstore",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26136"
},
{
"category": "external",
"summary": "RHBZ#2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e",
"url": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/issues/282",
"url": "https://github.com/salesforce/tough-cookie/issues/282"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3",
"url": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3"
},
{
"category": "external",
"summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873",
"url": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873"
}
],
"release_date": "2023-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:18:28+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5488"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tough-cookie: prototype pollution in cookie memstore"
},
{
"cve": "CVE-2023-26464",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-03-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2182864"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "log4j1-socketappender: DoS via hashmap logging",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8 and 9 security impacts have been reduced to Low as they do not enable the vulnerable JDK by default.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26464"
},
{
"category": "external",
"summary": "RHBZ#2182864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464"
},
{
"category": "external",
"summary": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464",
"url": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464"
}
],
"release_date": "2023-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:18:28+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5488"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "log4j1-socketappender: DoS via hashmap logging"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-33201"
},
{
"category": "external",
"summary": "RHBZ#2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201"
},
{
"category": "external",
"summary": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:18:28+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5488"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate"
},
{
"cve": "CVE-2023-34462",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216888"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SniHandler while navigating TLS handshake which may permit a large heap allocation if the handler did not have a timeout configured. This issue may allow an attacker to send a client hello packet which would cause the server to buffer large amounts of data per connection, potentially causing an out of memory error, resulting in Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: SniHandler 16MB allocation leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34462"
},
{
"category": "external",
"summary": "RHBZ#2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462"
}
],
"release_date": "2023-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-05T20:18:28+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5488"
},
{
"category": "workaround",
"details": "Configuration of SniHandler with an idle timeout will mitigate this issue.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: SniHandler 16MB allocation leads to OOM"
}
]
}
RHSA-2024:0719
Vulnerability from csaf_redhat - Published: 2024-02-07 15:32 - Updated: 2026-04-01 18:54A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor's perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Migration Toolkit for Runtimes 1.2.4 release\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Migration Toolkit for Runtimes 1.2.4 Images\n\nSecurity Fix(es):\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* jackson-databind: denial of service via cylic dependencies (CVE-2023-35116)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0719",
"url": "https://access.redhat.com/errata/RHSA-2024:0719"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2215214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215214"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0719.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Runtimes security, bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-01T18:54:22+00:00",
"generator": {
"date": "2026-04-01T18:54:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:0719",
"initial_release_date": "2024-02-07T15:32:23+00:00",
"revision_history": [
{
"date": "2024-02-07T15:32:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-02-07T15:32:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:54:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Migration Toolkit for Runtimes 1 on RHEL 8",
"product": {
"name": "Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "Migration Toolkit for Runtimes"
},
{
"branches": [
{
"category": "product_version",
"name": "mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"product": {
"name": "mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"product_id": "mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f?arch=s390x\u0026repository_url=registry.redhat.io/mtr/mtr-operator-bundle\u0026tag=1.2-13"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"product": {
"name": "mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"product_id": "mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c?arch=s390x\u0026repository_url=registry.redhat.io/mtr/mtr-rhel8-operator\u0026tag=1.2-9"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"product": {
"name": "mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"product_id": "mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22?arch=s390x\u0026repository_url=registry.redhat.io/mtr/mtr-web-container-rhel8\u0026tag=1.2-10"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"product": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"product_id": "mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4?arch=s390x\u0026repository_url=registry.redhat.io/mtr/mtr-web-executor-container-rhel8\u0026tag=1.2-8"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"product": {
"name": "mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"product_id": "mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04?arch=arm64\u0026repository_url=registry.redhat.io/mtr/mtr-operator-bundle\u0026tag=1.2-13"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64",
"product": {
"name": "mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64",
"product_id": "mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a?arch=arm64\u0026repository_url=registry.redhat.io/mtr/mtr-rhel8-operator\u0026tag=1.2-9"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"product": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"product_id": "mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097?arch=arm64\u0026repository_url=registry.redhat.io/mtr/mtr-web-executor-container-rhel8\u0026tag=1.2-8"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"product": {
"name": "mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"product_id": "mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82?arch=amd64\u0026repository_url=registry.redhat.io/mtr/mtr-operator-bundle\u0026tag=1.2-13"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"product": {
"name": "mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"product_id": "mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087?arch=amd64\u0026repository_url=registry.redhat.io/mtr/mtr-rhel8-operator\u0026tag=1.2-9"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"product": {
"name": "mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"product_id": "mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc?arch=amd64\u0026repository_url=registry.redhat.io/mtr/mtr-web-container-rhel8\u0026tag=1.2-10"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64",
"product": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64",
"product_id": "mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd?arch=amd64\u0026repository_url=registry.redhat.io/mtr/mtr-web-executor-container-rhel8\u0026tag=1.2-8"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"product": {
"name": "mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"product_id": "mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b?arch=ppc64le\u0026repository_url=registry.redhat.io/mtr/mtr-operator-bundle\u0026tag=1.2-13"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"product": {
"name": "mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"product_id": "mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0?arch=ppc64le\u0026repository_url=registry.redhat.io/mtr/mtr-rhel8-operator\u0026tag=1.2-9"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"product": {
"name": "mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"product_id": "mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae?arch=ppc64le\u0026repository_url=registry.redhat.io/mtr/mtr-web-container-rhel8\u0026tag=1.2-10"
}
}
},
{
"category": "product_version",
"name": "mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"product": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"product_id": "mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158?arch=ppc64le\u0026repository_url=registry.redhat.io/mtr/mtr-web-executor-container-rhel8\u0026tag=1.2-8"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le"
},
"product_reference": "mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64"
},
"product_reference": "mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x"
},
"product_reference": "mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64"
},
"product_reference": "mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x"
},
"product_reference": "mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le"
},
"product_reference": "mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64"
},
"product_reference": "mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64"
},
"product_reference": "mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64"
},
"product_reference": "mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le"
},
"product_reference": "mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x"
},
"product_reference": "mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x"
},
"product_reference": "mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64"
},
"product_reference": "mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le"
},
"product_reference": "mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"relates_to_product_reference": "8Base-MTR-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64 as a component of Migration Toolkit for Runtimes 1 on RHEL 8",
"product_id": "8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64"
},
"product_reference": "mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64",
"relates_to_product_reference": "8Base-MTR-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64"
],
"known_not_affected": [
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-07T15:32:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0719"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2023-35116",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215214"
}
],
"notes": [
{
"category": "description",
"text": "jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor\u0027s perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jackson-databind: denial of service via cylic dependencies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is disputed by the component developers and is under reconsideration by NIST. As such, it should be excluded from scanning utilities or other compliance systems until the dispute is finalized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64"
],
"known_not_affected": [
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-35116"
},
{
"category": "external",
"summary": "RHBZ#2215214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35116"
}
],
"release_date": "2023-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-07T15:32:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0719"
},
{
"category": "workaround",
"details": "jackson-databind should not be used to deserialize untrusted inputs. User inputs should be validated and sanitized before processing.",
"product_ids": [
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8723ff82aa53d56530e923340289f549f9cae9d1d66ae6559d07db9535c53c4b_ppc64le",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:8c91c79d241c860d9dbf64ad02ce319dd4b4787f7f2c8a14d2d685624806ed04_arm64",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:9046593959cf11bc952f5bda39478fd5abc3e7ab5c61a4fdf96d15897aa0d78f_s390x",
"8Base-MTR-1:mtr/mtr-operator-bundle@sha256:b786a18de43145dbe1ec6a137bf6dbe72adca095146c7158424eda0ad84abd82_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:61cdc15df15d08b2d133bc4f8fe31bffbee209de1faf9ccc5cf1285c2a6aca1c_s390x",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:8e4b3b5bb06df89b119bb93234aec29660ff03481298074c2f011f74d4c185f0_ppc64le",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:c8b896612d3682641298ddd7502cda0ef6425c53b724aa3bfd4a31352c960087_amd64",
"8Base-MTR-1:mtr/mtr-rhel8-operator@sha256:ef4ecb153b4b8b14d63f7d331ffe158b180120e20ce94599e6a7cfa74fa49b6a_arm64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:34e91adfb0c4a0ce3be35cefd7c6c585fa866a150629c06c06555c34933f7cbc_amd64",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a314c3e344566e9772b609e5aacffcc78fee8f7d56002f6d9d97d7cba572d6ae_ppc64le",
"8Base-MTR-1:mtr/mtr-web-container-rhel8@sha256:a864b9445262878cb0066ae7101c1a1998ce335bb72ce013ac561d19a021eb22_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:91164350574d037eea7f4a456213977fbd34bf78a150e1efa9f58360295e97e4_s390x",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:c58c38ea26dfa2d07d73bdc403c7645574ddc9ee17304fcc5d61ff876dcf6097_arm64",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:cd600c6d2f9b7c5f1863586c39f66951d37b0e6098f455c3f65cc9a783d05158_ppc64le",
"8Base-MTR-1:mtr/mtr-web-executor-container-rhel8@sha256:d79c7de19d3b751331fc64d53f1ebe27b71ab3a92dda65fa44ddf0e9e7e24bbd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jackson-databind: denial of service via cylic dependencies"
}
]
}
RHSA-2023:5379
Vulnerability from csaf_redhat - Published: 2023-09-28 02:59 - Updated: 2026-04-01 18:53A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A flaw was found in the Node.js word-wrap module, where it is vulnerable to a denial of service caused by a Regular expression denial of service (ReDoS) issue in the result variable. By sending a specially crafted regex input, a remote attacker can cause a denial of service.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Network Observability is an OpenShift operator that deploys a monitoring pipeline to collect and enrich network flows that are produced by the Network Observability eBPF agent.\n\nThe operator provides dashboards, metrics, and keeps flows accessible in a queryable log store, Grafana Loki. When a FlowCollector is deployed, new dashboards are available in the Console.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Network Observability 1.4.0\n\nSecurity Fix(es):\n\n* word-wrap: Regular Expression Denial of Service (CVE-2023-26115)\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5379",
"url": "https://access.redhat.com/errata/RHSA-2023:5379"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "2216827",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216827"
},
{
"category": "external",
"summary": "NETOBSERV-1009",
"url": "https://issues.redhat.com/browse/NETOBSERV-1009"
},
{
"category": "external",
"summary": "NETOBSERV-1034",
"url": "https://issues.redhat.com/browse/NETOBSERV-1034"
},
{
"category": "external",
"summary": "NETOBSERV-1056",
"url": "https://issues.redhat.com/browse/NETOBSERV-1056"
},
{
"category": "external",
"summary": "NETOBSERV-1107",
"url": "https://issues.redhat.com/browse/NETOBSERV-1107"
},
{
"category": "external",
"summary": "NETOBSERV-1119",
"url": "https://issues.redhat.com/browse/NETOBSERV-1119"
},
{
"category": "external",
"summary": "NETOBSERV-1131",
"url": "https://issues.redhat.com/browse/NETOBSERV-1131"
},
{
"category": "external",
"summary": "NETOBSERV-1137",
"url": "https://issues.redhat.com/browse/NETOBSERV-1137"
},
{
"category": "external",
"summary": "NETOBSERV-1182",
"url": "https://issues.redhat.com/browse/NETOBSERV-1182"
},
{
"category": "external",
"summary": "NETOBSERV-1196",
"url": "https://issues.redhat.com/browse/NETOBSERV-1196"
},
{
"category": "external",
"summary": "NETOBSERV-1224",
"url": "https://issues.redhat.com/browse/NETOBSERV-1224"
},
{
"category": "external",
"summary": "NETOBSERV-1242",
"url": "https://issues.redhat.com/browse/NETOBSERV-1242"
},
{
"category": "external",
"summary": "NETOBSERV-1283",
"url": "https://issues.redhat.com/browse/NETOBSERV-1283"
},
{
"category": "external",
"summary": "NETOBSERV-139",
"url": "https://issues.redhat.com/browse/NETOBSERV-139"
},
{
"category": "external",
"summary": "NETOBSERV-962",
"url": "https://issues.redhat.com/browse/NETOBSERV-962"
},
{
"category": "external",
"summary": "NETOBSERV-975",
"url": "https://issues.redhat.com/browse/NETOBSERV-975"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5379.json"
}
],
"title": "Red Hat Security Advisory: Network Observability 1.4.0 for OpenShift",
"tracking": {
"current_release_date": "2026-04-01T18:53:36+00:00",
"generator": {
"date": "2026-04-01T18:53:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:5379",
"initial_release_date": "2023-09-28T02:59:49+00:00",
"revision_history": [
{
"date": "2023-09-28T02:59:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-09-28T02:59:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:53:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "NETOBSERV 1.4 for RHEL 9",
"product": {
"name": "NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_observ_optr:1.4.0::el9"
}
}
}
],
"category": "product_family",
"name": "Network Observability"
},
{
"branches": [
{
"category": "product_version",
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x",
"product": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x",
"product_id": "network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582?arch=s390x\u0026repository_url=registry.redhat.io/network-observability/network-observability-console-plugin-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x",
"product": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x",
"product_id": "network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a?arch=s390x\u0026repository_url=registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x",
"product": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x",
"product_id": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd?arch=s390x\u0026repository_url=registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x",
"product": {
"name": "network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x",
"product_id": "network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26?arch=s390x\u0026repository_url=registry.redhat.io/network-observability/network-observability-operator-bundle\u0026tag=1.4.0-55"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x",
"product": {
"name": "network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x",
"product_id": "network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f?arch=s390x\u0026repository_url=registry.redhat.io/network-observability/network-observability-rhel9-operator\u0026tag=v1.4.0-42"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64",
"product": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64",
"product_id": "network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9?arch=amd64\u0026repository_url=registry.redhat.io/network-observability/network-observability-console-plugin-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64",
"product": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64",
"product_id": "network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5?arch=amd64\u0026repository_url=registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64",
"product": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64",
"product_id": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a?arch=amd64\u0026repository_url=registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64",
"product": {
"name": "network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64",
"product_id": "network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd?arch=amd64\u0026repository_url=registry.redhat.io/network-observability/network-observability-operator-bundle\u0026tag=1.4.0-55"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64",
"product": {
"name": "network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64",
"product_id": "network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1?arch=amd64\u0026repository_url=registry.redhat.io/network-observability/network-observability-rhel9-operator\u0026tag=v1.4.0-42"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le",
"product": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le",
"product_id": "network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability/network-observability-console-plugin-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le",
"product": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le",
"product_id": "network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le",
"product": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le",
"product_id": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le",
"product": {
"name": "network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le",
"product_id": "network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability/network-observability-operator-bundle\u0026tag=1.4.0-55"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le",
"product": {
"name": "network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le",
"product_id": "network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability/network-observability-rhel9-operator\u0026tag=v1.4.0-42"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64",
"product": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64",
"product_id": "network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61?arch=arm64\u0026repository_url=registry.redhat.io/network-observability/network-observability-console-plugin-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64",
"product": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64",
"product_id": "network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f?arch=arm64\u0026repository_url=registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64",
"product": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64",
"product_id": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7?arch=arm64\u0026repository_url=registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9\u0026tag=v1.4.0-42"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64",
"product": {
"name": "network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64",
"product_id": "network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128?arch=arm64\u0026repository_url=registry.redhat.io/network-observability/network-observability-operator-bundle\u0026tag=1.4.0-55"
}
}
},
{
"category": "product_version",
"name": "network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64",
"product": {
"name": "network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64",
"product_id": "network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b?arch=arm64\u0026repository_url=registry.redhat.io/network-observability/network-observability-rhel9-operator\u0026tag=v1.4.0-42"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64"
},
"product_reference": "network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le"
},
"product_reference": "network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64"
},
"product_reference": "network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x"
},
"product_reference": "network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64"
},
"product_reference": "network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x"
},
"product_reference": "network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64"
},
"product_reference": "network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le"
},
"product_reference": "network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64"
},
"product_reference": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x"
},
"product_reference": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64"
},
"product_reference": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le"
},
"product_reference": "network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64"
},
"product_reference": "network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64"
},
"product_reference": "network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le"
},
"product_reference": "network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x"
},
"product_reference": "network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64"
},
"product_reference": "network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64 as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64"
},
"product_reference": "network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x"
},
"product_reference": "network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le as a component of NETOBSERV 1.4 for RHEL 9",
"product_id": "9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le"
},
"product_reference": "network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le",
"relates_to_product_reference": "9Base-NETWORK-OBSERVABILITY-1.4.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-28T02:59:49+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5379"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2023-26115",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216827"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Node.js word-wrap module, where it is vulnerable to a denial of service caused by a Regular expression denial of service (ReDoS) issue in the result variable. By sending a specially crafted regex input, a remote attacker can cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "word-wrap: ReDoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26115"
},
{
"category": "external",
"summary": "RHBZ#2216827",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216827"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26115",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26115"
}
],
"release_date": "2023-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-28T02:59:49+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5379"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:0211283244126419a203cbca952135abd4f44dde06071344dc77400b9a868e61_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:5359d3c92203cfa3eeda959c96677526e8b3cefde46f59d0548379840e3e35e6_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:a4b5cfad89aeff1cc0798caa932b59444c39b06f04d41846859476530f669ad9_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-console-plugin-rhel9@sha256:adf7cff9e8861773f73e5d30940f25565474233029837c4d55a979a1fa926582_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:301e4df92311d658a96dae2d3ff02a2ada999de89545ef96c4ec651faf54b25f_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:5353df15da0a204e5672dfee4f95e6ad17cadb033f8ac827904d50ce01e01a5a_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:79ca8ed3d7436c87c5b7bce35da7b9aba47d8ce9367988e5b169fd46c2d816a5_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-ebpf-agent-rhel9@sha256:ffb45ad2a13c481c9ce6d29795c3b9182e5fe45d2ae2d48bbcfd8058e2aa3319_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:05e733ec54543d5f675ee1f6f27f644a90c9ab30f9678266921cd1c14a9554c7_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:10d863f938182620abf90b0ce533121e78f240166eee1bb62fd8134c126c88fd_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:6e22bcf4ce8ce50501fb2101205940e072ec2ffb7037f487c8b81a527cfc9d5a_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b58f7999d572ec7e5acef3af3d97f1ee8e20e393502df9971b8a0b0bbe886dee_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:0932d209dbfe7d611e4d2362f0ffc7c17757670b80b691c3fcd7472859ac8128_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:25dfc5ecfc1614d67a9768b8cebb58367cac16c5e541646bb2dc13d75c705bdd_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:78c28048adcd4b2df279ba3bb33dc8082d60430fb121e686d1d2774615c0454f_ppc64le",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-operator-bundle@sha256:e24584ac071694868f26d429505241662c0afd625fdaac6f1b9fabba52060a26_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:0ba541a7141826d6d6f2755add1fd0487ded4a0db34d74733d590d137dcf0da1_amd64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:632512065b6c3261f599a43bb9a52354bade428ddc7047f123866b8c5b09940b_arm64",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:83a93f8a7ce0baf98dac07bce26e9340be70966fa8d45132c36be38c5338237f_s390x",
"9Base-NETWORK-OBSERVABILITY-1.4.0:network-observability/network-observability-rhel9-operator@sha256:f766d0fd8688450dbddd31a7d761800e59b1ad681bda11e2ed26efe7403e8ec0_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "word-wrap: ReDoS"
}
]
}
RHSA-2023:5361
Vulnerability from csaf_redhat - Published: 2023-09-26 14:56 - Updated: 2026-04-01 18:53A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A vulnerability has been discovered in Node.js, where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.
A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.
A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).
A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.
A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.
A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.
A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding('spawn_sync') to run arbitrary code outside of the limits defined in a policy.json file.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (16). (BZ#2223679, BZ#2223681, BZ#2223683, BZ#2223685, BZ#2223687, BZ#2233892)\n\nSecurity Fix(es):\n\n* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* nodejs: mainModule.proto bypass experimental policy mechanism (CVE-2023-30581)\n\n* nodejs: process interuption due to invalid Public Key information in x509 certificates (CVE-2023-30588)\n\n* nodejs: HTTP Request Smuggling via Empty headers separated by CR (CVE-2023-30589)\n\n* nodejs: DiffieHellman do not generate keys after setting a private key (CVE-2023-30590)\n\n* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)\n\n* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:16/nodejs: nodejs.prov doesn\u0027t generate the bundled dependency for modules starting @ like @colors/colors (BZ#2237395)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5361",
"url": "https://access.redhat.com/errata/RHSA-2023:5361"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "2219824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219824"
},
{
"category": "external",
"summary": "2219838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219838"
},
{
"category": "external",
"summary": "2219841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219841"
},
{
"category": "external",
"summary": "2219842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219842"
},
{
"category": "external",
"summary": "2223679",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223679"
},
{
"category": "external",
"summary": "2230948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948"
},
{
"category": "external",
"summary": "2230955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955"
},
{
"category": "external",
"summary": "2230956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956"
},
{
"category": "external",
"summary": "2233892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233892"
},
{
"category": "external",
"summary": "2237395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237395"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5361.json"
}
],
"title": "Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2026-04-01T18:53:32+00:00",
"generator": {
"date": "2026-04-01T18:53:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:5361",
"initial_release_date": "2023-09-26T14:56:14+00:00",
"revision_history": [
{
"date": "2023-09-26T14:56:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-09-26T14:56:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:53:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product": {
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16)",
"product_id": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16)",
"product_id": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16)",
"product_id": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16)",
"product_id": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16)",
"product_id": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16)",
"product_id": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"product": {
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src (nodejs:16)",
"product_id": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=src\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src (nodejs:16)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.6.0%2B19765%2B366b9144?arch=src\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"product": {
"name": "nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src (nodejs:16)",
"product_id": "nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@26-1.module%2Bel8.6.0%2B19856%2Bc0c87259?arch=src\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"product": {
"name": "nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch (nodejs:16)",
"product_id": "nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch (nodejs:16)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.6.0%2B19765%2B366b9144?arch=noarch\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"product": {
"name": "nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch (nodejs:16)",
"product_id": "nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@26-1.module%2Bel8.6.0%2B19856%2Bc0c87259?arch=noarch\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product": {
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16)",
"product_id": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16)",
"product_id": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16)",
"product_id": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16)",
"product_id": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16)",
"product_id": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16)",
"product_id": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product": {
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x (nodejs:16)",
"product_id": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x (nodejs:16)",
"product_id": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x (nodejs:16)",
"product_id": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x (nodejs:16)",
"product_id": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x (nodejs:16)",
"product_id": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x (nodejs:16)",
"product_id": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product": {
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16)",
"product_id": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16)",
"product_id": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16)",
"product_id": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16)",
"product_id": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16)",
"product_id": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16)",
"product_id": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16"
},
"product_reference": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16"
},
"product_reference": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16"
},
"product_reference": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16"
},
"product_reference": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
},
"product_reference": "nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
},
"product_reference": "nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16"
},
"product_reference": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16"
},
"product_reference": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16"
},
"product_reference": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
},
"product_reference": "nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16"
},
"product_reference": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16"
},
"product_reference": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16"
},
"product_reference": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
},
"product_reference": "nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16"
},
"product_reference": "nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
},
"product_reference": "nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16"
},
"product_reference": "nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16"
},
"product_reference": "nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64 (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
},
"product_reference": "npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5361"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2023-30581",
"discovery_date": "2023-06-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219824"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been discovered in Node.js, where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: mainModule.proto bypass experimental policy mechanism",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an IMPORTANT severity because this vulnerability is a policy bypass resulting from the improper handling of the JavaScript prototype chain. A malicious actor can trigger this flaw by using process.mainModule.__proto__.require() to load and execute modules explicitly disallowed by the policy.json configuration.\n\nSuccessful exploitation allows for the execution of unauthorized code within the context of the application process, leading to a compromise of system integrity.\n\nAt the time of this CVE\u0027s disclosure, the affected policy mechanism was designated as an experimental feature.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-30581"
},
{
"category": "external",
"summary": "RHBZ#2219824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219824"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-30581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30581"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30581",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30581"
}
],
"release_date": "2023-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5361"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: mainModule.proto bypass experimental policy mechanism"
},
{
"cve": "CVE-2023-30588",
"discovery_date": "2023-06-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219838"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: process interuption due to invalid Public Key information in x509 certificates",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-30588"
},
{
"category": "external",
"summary": "RHBZ#2219838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219838"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-30588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30588"
}
],
"release_date": "2023-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5361"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: process interuption due to invalid Public Key information in x509 certificates"
},
{
"cve": "CVE-2023-30589",
"discovery_date": "2023-06-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: HTTP Request Smuggling via Empty headers separated by CR",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is in the llhttp parsing not using the CRLF sequence which violates the HTTP/1.1 specification, which mandates CRLF as the delimiter. While this might result in request smuggling, the added complexity of creating a valid malformed delimited request and having it reach the intended target and then processed,which is why this has been rated as moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-30589"
},
{
"category": "external",
"summary": "RHBZ#2219841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-30589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30589",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30589"
}
],
"release_date": "2023-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5361"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: HTTP Request Smuggling via Empty headers separated by CR"
},
{
"cve": "CVE-2023-30590",
"discovery_date": "2023-06-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: DiffieHellman do not generate keys after setting a private key",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The generateKeys() API function returned from crypto.createDiffieHellman() in Node.js does not behave as documented as the documentation states that the function \u201cgenerates private and public Diffie-Hellman key values.\u201d However, the actual implementation only generates a private key if one has not yet been set, and does not recompute or regenerate the public key if the private key was previously defined using setPrivateKey(), which is why this could only in theory, result in weak or predictable shared secrets. The issue at hand is a developer facing hazard caused by a mismatch in the documentation and application of the function, and is not in itself a security vulnerability, which is why Redhat has assessed this as moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-30590"
},
{
"category": "external",
"summary": "RHBZ#2219842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-30590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30590"
}
],
"release_date": "2023-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5361"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: DiffieHellman do not generate keys after setting a private key"
},
{
"cve": "CVE-2023-32002",
"cwe": {
"id": "CWE-1268",
"name": "Policy Privileges are not Assigned Consistently Between Control and Data Agents"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230948"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can be bypassed via Module._load",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important instead of Critical because it only impacts users of the policy mechanism that must be explicitly enabled using the `--experimental-policy` flag. This is not enabled by default.\n\nRed Hat\u0027s Secure Software Development Life Cycle utilizes a layered testing approach. This significantly increases attack complexity, because a compromised package must remain undetected for months to years in testing in upstream communities before it could be adopted into a Red Hat product. This long dwell-time reduces impact to Important.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32002"
},
{
"category": "external",
"summary": "RHBZ#2230948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5361"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Permissions policies can be bypassed via Module._load"
},
{
"cve": "CVE-2023-32006",
"cwe": {
"id": "CWE-213",
"name": "Exposure of Sensitive Information Due to Incompatible Policies"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230955"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32006"
},
{
"category": "external",
"summary": "RHBZ#2230955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5361"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()"
},
{
"cve": "CVE-2023-32559",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230956"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(\u0027spawn_sync\u0027) to run arbitrary code outside of the limits defined in a policy.json file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Permissions policies can be bypassed via process.binding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "When this CVE was reported, the policy.json file was still experimental in nature and not deployed and widely in environments,which is why at the time when this CVE was submitted,Redhat chose to classify this as moderare.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32559"
},
{
"category": "external",
"summary": "RHBZ#2230956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559",
"url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559"
}
],
"release_date": "2023-08-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-26T14:56:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5361"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debuginfo-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-debugsource-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-devel-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-docs-1:16.20.2-2.module+el8.6.0+19897+9590a839.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-full-i18n-1:16.20.2-2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.6.0+19765+366b9144.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.noarch::nodejs:16",
"AppStream-8.6.0.Z.EUS:nodejs-packaging-0:26-1.module+el8.6.0+19856+c0c87259.src::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x::nodejs:16",
"AppStream-8.6.0.Z.EUS:npm-1:8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64::nodejs:16"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Permissions policies can be bypassed via process.binding"
}
]
}
RHSA-2023:5485
Vulnerability from csaf_redhat - Published: 2023-10-06 07:21 - Updated: 2026-04-01 18:45A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.
A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.
A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.
A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.
A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.
A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.
A flaw was found in Netty's SniHandler while navigating TLS handshake which may permit a large heap allocation if the handler did not have a timeout configured. This issue may allow an attacker to send a client hello packet which would cause the server to buffer large amounts of data per connection, potentially causing an out of memory error, resulting in Denial of Service.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* server: eap-7: heap exhaustion via deserialization (CVE-2023-3171)\n\n* log4j: log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging (CVE-2023-26464)\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor (CVE-2023-4061)\n\n* tough-cookie: prototype pollution in cookie memstore (CVE-2023-26136)\n\n* bouncycastle: potential blind LDAP injection attack using a self-signed certificate (CVE-2023-33201)\n\n* netty: netty-handler: SniHandler 16MB allocation (CVE-2023-34462)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5485",
"url": "https://access.redhat.com/errata/RHSA-2023:5485"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
},
{
"category": "external",
"summary": "2182864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864"
},
{
"category": "external",
"summary": "2213639",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639"
},
{
"category": "external",
"summary": "2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "2228608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228608"
},
{
"category": "external",
"summary": "JBEAP-24667",
"url": "https://issues.redhat.com/browse/JBEAP-24667"
},
{
"category": "external",
"summary": "JBEAP-24798",
"url": "https://issues.redhat.com/browse/JBEAP-24798"
},
{
"category": "external",
"summary": "JBEAP-24966",
"url": "https://issues.redhat.com/browse/JBEAP-24966"
},
{
"category": "external",
"summary": "JBEAP-24985",
"url": "https://issues.redhat.com/browse/JBEAP-24985"
},
{
"category": "external",
"summary": "JBEAP-25032",
"url": "https://issues.redhat.com/browse/JBEAP-25032"
},
{
"category": "external",
"summary": "JBEAP-25033",
"url": "https://issues.redhat.com/browse/JBEAP-25033"
},
{
"category": "external",
"summary": "JBEAP-25078",
"url": "https://issues.redhat.com/browse/JBEAP-25078"
},
{
"category": "external",
"summary": "JBEAP-25122",
"url": "https://issues.redhat.com/browse/JBEAP-25122"
},
{
"category": "external",
"summary": "JBEAP-25135",
"url": "https://issues.redhat.com/browse/JBEAP-25135"
},
{
"category": "external",
"summary": "JBEAP-25186",
"url": "https://issues.redhat.com/browse/JBEAP-25186"
},
{
"category": "external",
"summary": "JBEAP-25200",
"url": "https://issues.redhat.com/browse/JBEAP-25200"
},
{
"category": "external",
"summary": "JBEAP-25225",
"url": "https://issues.redhat.com/browse/JBEAP-25225"
},
{
"category": "external",
"summary": "JBEAP-25261",
"url": "https://issues.redhat.com/browse/JBEAP-25261"
},
{
"category": "external",
"summary": "JBEAP-25285",
"url": "https://issues.redhat.com/browse/JBEAP-25285"
},
{
"category": "external",
"summary": "JBEAP-25312",
"url": "https://issues.redhat.com/browse/JBEAP-25312"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5485.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update on RHEL 8",
"tracking": {
"current_release_date": "2026-04-01T18:45:43+00:00",
"generator": {
"date": "2026-04-01T18:45:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:5485",
"initial_release_date": "2023-10-06T07:21:50+00:00",
"revision_history": [
{
"date": "2023-10-06T07:21:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-06T07:21:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:45:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.8-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-31.Final_redhat_00030.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"product_id": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.13-2.SP1_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.94-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.8.10-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-mod_cluster@1.4.5-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.20-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.31-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.19-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.15-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"product": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"product_id": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis@2.16.0-15.redhat_00049.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"product_id": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle@1.76.0-4.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"product_id": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.13-8.GA_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-modules@1.12.2-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"product_id": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.26-1.SP1_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.94-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-31.Final_redhat_00030.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-31.Final_redhat_00030.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-31.Final_redhat_00030.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.13-2.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling-river@2.0.13-2.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-rxtx@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-udt@4.1.94-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.8.10-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-mod_cluster@1.4.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.20-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.15.20-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.31-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-core@5.3.31-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-entitymanager@5.3.31-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-envers@5.3.31-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-java8@5.3.31-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.19-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.15-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.15-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.15-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.15-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.15-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.15-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.15-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.15-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.15-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-cli@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-commons@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-core-client@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-dto@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-hornetq-protocol@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-hqclient-protocol@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jdbc-store@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jms-client@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-jms-server@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-journal@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-ra@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-selector@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-server@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-service-extensions@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-tools@2.16.0-15.redhat_00049.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle@1.76.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-mail@1.76.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-pg@1.76.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-pkix@1.76.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-prov@1.76.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_id": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-bouncycastle-util@1.76.0-4.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.13-8.GA_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.13-8.GA_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.13-8.GA_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.13-8.GA_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.13-8.GA_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.13-8.GA_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-modules@1.12.2-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.26-1.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.94-1.Final_redhat_00001.1.el8eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.94-1.Final_redhat_00001.1.el8eap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src"
},
"product_reference": "eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216475"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-semver: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Products versus NVD\u0027s High due to deployment context. The flaw in node-semver\u0027s new Range() function causes catastrophic regex backtracking on crafted input, leading to CPU exhaustion. However, exploitation requires untrusted input passed directly to the parser. So node-semver is a build-time dev dependency, not present in runtime environment in RHACM, and the functionality is additionally protected behind OAuth authentication, further limiting attack surface.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "RHBZ#2216475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw",
"url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"release_date": "2023-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T07:21:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-semver: Regular expression denial of service"
},
{
"cve": "CVE-2023-3171",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"discovery_date": "2023-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2213639"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "eap-7: heap exhaustion via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3171"
},
{
"category": "external",
"summary": "RHBZ#2213639",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T07:21:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5485"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "eap-7: heap exhaustion via deserialization"
},
{
"cve": "CVE-2023-4061",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228608"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability requires a malicious user to previously have access to the system, especially access to the HAL interface via browser and logged with a management user who have access to the resolve-expression method, hence the moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-4061"
},
{
"category": "external",
"summary": "RHBZ#2228608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228608"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-4061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4061"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-4061",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4061"
}
],
"release_date": "2023-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T07:21:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5485"
},
{
"category": "workaround",
"details": "Wildfly administrators are recommended to use Vault, especially the Elytron subsystem, to store potential critical information such as DNS, IPs, and credentials.",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor"
},
{
"acknowledgments": [
{
"names": [
"Kokorin Vsevolod"
]
}
],
"cve": "CVE-2023-26136",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2023-07-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219310"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the tough-cookie package which allows Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tough-cookie: prototype pollution in cookie memstore",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26136"
},
{
"category": "external",
"summary": "RHBZ#2219310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e",
"url": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/issues/282",
"url": "https://github.com/salesforce/tough-cookie/issues/282"
},
{
"category": "external",
"summary": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3",
"url": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3"
},
{
"category": "external",
"summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873",
"url": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873"
}
],
"release_date": "2023-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T07:21:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5485"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tough-cookie: prototype pollution in cookie memstore"
},
{
"cve": "CVE-2023-26464",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-03-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2182864"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "log4j1-socketappender: DoS via hashmap logging",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8 and 9 security impacts have been reduced to Low as they do not enable the vulnerable JDK by default.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26464"
},
{
"category": "external",
"summary": "RHBZ#2182864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464"
},
{
"category": "external",
"summary": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464",
"url": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464"
}
],
"release_date": "2023-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T07:21:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "log4j1-socketappender: DoS via hashmap logging"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-33201"
},
{
"category": "external",
"summary": "RHBZ#2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201"
},
{
"category": "external",
"summary": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T07:21:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5485"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate"
},
{
"cve": "CVE-2023-34462",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216888"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SniHandler while navigating TLS handshake which may permit a large heap allocation if the handler did not have a timeout configured. This issue may allow an attacker to send a client hello packet which would cause the server to buffer large amounts of data per connection, potentially causing an out of memory error, resulting in Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: SniHandler 16MB allocation leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34462"
},
{
"category": "external",
"summary": "RHBZ#2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462"
}
],
"release_date": "2023-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-06T07:21:50+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5485"
},
{
"category": "workaround",
"details": "Configuration of SniHandler with an idle timeout will mitigate this issue.",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-0:2.16.0-15.redhat_00049.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-activemq-artemis-cli-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-commons-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-core-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-dto-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hornetq-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-hqclient-protocol-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jdbc-store-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-client-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-jms-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-journal-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-ra-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-selector-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-server-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-service-extensions-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-tools-0:2.16.0-15.redhat_00049.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-0:1.76.0-4.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-bouncycastle-mail-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pg-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-pkix-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-prov-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-bouncycastle-util-0:1.76.0-4.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hal-console-0:3.3.19-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-0:5.3.31-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-hibernate-core-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-entitymanager-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-envers-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-hibernate-java8-0:5.3.31-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.15-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.15-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-0:2.0.13-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-marshalling-river-0:2.0.13-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-modules-0:1.12.2-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-31.Final_redhat_00030.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-31.Final_redhat_00030.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-xnio-base-0:3.8.10-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-mod_cluster-0:1.4.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.94-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.94-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.26-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.13-8.GA_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-0:1.15.20-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-elytron-tool-0:1.15.20-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.13-8.GA_redhat_00001.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: SniHandler 16MB allocation leads to OOM"
}
]
}
CERTFR-2024-AVI-0074
Vulnerability from certfr_avis - Published: 2024-01-26 - Updated: 2024-01-26
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.3.x.x antérieures à 6.3.0.2.iFix005 | ||
| IBM | QRadar Deployment Intelligence App | IBM QRadar Deployment Intelligence App versions antérieures à 3.0.12 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.2.x.x antérieures à 6.2.0.7.iFix005 | ||
| IBM | QRadar | IBM SOAR QRadar Plugin App versions antérieures à 5.3.1 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.0.x.x antérieures à 6.0.0.2.iFix159 | ||
| IBM | Storage Protect | IBM Storage Protect Plus vSnap versions 10.1.x antérieures à 10.1.15.3 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.1.x.x antérieures à 6.1.0.4.iFix099 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.2.iFix005",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.12",
"product": {
"name": "QRadar Deployment Intelligence App",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.7.iFix005",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.3.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.0.x.x ant\u00e9rieures \u00e0 6.0.0.2.iFix159",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Storage Protect Plus vSnap versions 10.1.x ant\u00e9rieures \u00e0 10.1.15.3",
"product": {
"name": "Storage Protect",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.4.iFix099",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-4004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38020"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2023-46136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2023-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38019"
},
{
"name": "CVE-2023-47148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47148"
},
{
"name": "CVE-2023-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38263"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
}
],
"initial_release_date": "2024-01-26T00:00:00",
"last_revision_date": "2024-01-26T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111880 du 24 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7111880"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111720 du 22 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7111720"
}
],
"reference": "CERTFR-2024-AVI-0074",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111720 du 24 janvier 2024",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7096482 du 22 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7096482"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111880 du 25 janvier 2024",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111679 du 24 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7111679"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: 2025-09-05 - Updated: 2025-09-05
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2023-AVI-0976
Vulnerability from certfr_avis - Published: 2023-11-23 - Updated: 2023-11-23
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.2.x antérieures à 6.2.0.20 | ||
| IBM | Sterling Connect:Direct | Interface utilisateur IBM Sterling Connect:Direct versions 1.x antérieures à 1.5.0.2 iFix-39 | ||
| IBM | QRadar | Agent QRadar WinCollect (Standalone) versions antérieures à 10.1.8 | ||
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.0.x à 6.1.x antérieures à 6.1.0.22 | ||
| IBM | QRadar | Suite QRadar versions 1.10.x antérieures à 1.10.17.0 | ||
| IBM | Sterling | IBM Sterling B2B Integrator versions 6.0.x antérieures à 6.0.3.9 | ||
| IBM | Sterling | IBM Sterling B2B Integrator versions 6.1.0.x à 6.1.2.x antérieures à 6.1.2.3 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions 1.10.x antérieures à 1.10.17.0 | ||
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.3.x antérieures à 6.3.0.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.20",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Interface utilisateur IBM Sterling Connect:Direct versions 1.x ant\u00e9rieures \u00e0 1.5.0.2 iFix-39",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Agent QRadar WinCollect (Standalone) versions ant\u00e9rieures \u00e0 10.1.8",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.0.x \u00e0 6.1.x ant\u00e9rieures \u00e0 6.1.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Suite QRadar versions 1.10.x ant\u00e9rieures \u00e0 1.10.17.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.1.0.x \u00e0 6.1.2.x ant\u00e9rieures \u00e0 6.1.2.3",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions 1.10.x ant\u00e9rieures \u00e0 1.10.17.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.5",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2021-37701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-36313",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36313"
},
{
"name": "CVE-2021-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42248"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2021-32804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2022-41966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41966"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-26279",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26279"
},
{
"name": "CVE-2022-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40153"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2022-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2021-32803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
},
{
"name": "CVE-2022-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40151"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36777"
},
{
"name": "CVE-2023-32001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32001"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2017-18640",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18640"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2023-34104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34104"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40156"
},
{
"name": "CVE-2022-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40155"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41080"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2021-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39008"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2022-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40154"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
}
],
"initial_release_date": "2023-11-23T00:00:00",
"last_revision_date": "2023-11-23T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0976",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-11-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080118 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080118"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080174 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080174"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080106 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080106"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080058 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080058"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080117 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080117"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080177 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080177"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080176 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080176"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7081403 du 22 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7081403"
}
]
}
CERTFR-2026-AVI-0109
Vulnerability from certfr_avis - Published: 2026-01-30 - Updated: 2026-01-30
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar | QRadar User Behavior Analytics versions antérieures à 5.1.0 | ||
| IBM | Tivoli | Tivoli Application Dependency Discovery Manager version 7.3.0 sans le dernier correctif de sécurité | ||
| IBM | Db2 | Db2 versions 12.1.x antérieures à 12.1.2 sans le correctif de sécurité #72296 | ||
| IBM | Db2 | DB2 Data Management Console versions 3.1.1x antérieures à 3.1.13.2 | ||
| IBM | WebSphere | WebSphere Application Server version 9.0 avec IBM SDK, Java Technology Edition Version 8 SR8 FP 60 | ||
| IBM | WebSphere | WebSphere Application Server version 8.5 avec IBM SDK, Java Technology Edition Version 8 SR8 FP 60 | ||
| IBM | Db2 | Db2 Big SQL on Cloud Pak for Data versions 7.8 sur Cloud Pak for Data 5.1 antérieures à 8.3 sur Cloud Pak for Data 5.3 | ||
| IBM | Db2 | Db2 versions 11.5.x antérieures à 11.5.9 sans le correctif de sécurité #66394 | ||
| IBM | Db2 | Db2 version 12.1.3 sans le correctif de sécurité #71609 | ||
| IBM | Db2 | Db2 Big SQL on Cloud Pak for Data versions 7.6 sur Cloud Pak for Data 4.8 antérieures à 8.3 sur Cloud Pak for Data 5.3 | ||
| IBM | Db2 | Db2 Big SQL on Cloud Pak for Data versions 8.2 sur Cloud Pak for Data 5.2 antérieures à 8.3 sur Cloud Pak for Data 5.3 | ||
| IBM | WebSphere | WebSphere Application Server Liberty versions 17.0.0.3 à 26.0.0.1 sans le correctif de sécurité PH69485 ou antérieures à 26.0.0.2 (disponibilité prévue pour le premier trimestre 2026) | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP14 IF04 | ||
| IBM | Db2 | Db2 Big SQL on Cloud Pak for Data versions 7.7 sur Cloud Pak for Data 5.0 antérieures à 8.3 sur Cloud Pak for Data 5.3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar User Behavior Analytics versions ant\u00e9rieures \u00e0 5.1.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Tivoli Application Dependency Discovery Manager version 7.3.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Tivoli",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 12.1.x ant\u00e9rieures \u00e0 12.1.2 sans le correctif de s\u00e9curit\u00e9 #72296",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console versions 3.1.1x ant\u00e9rieures \u00e0 3.1.13.2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server version 9.0 avec IBM SDK, Java Technology Edition Version 8 SR8 FP 60",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server version 8.5 avec IBM SDK, Java Technology Edition Version 8 SR8 FP 60",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Big SQL on Cloud Pak for Data versions 7.8 sur Cloud Pak for Data 5.1 ant\u00e9rieures \u00e0 8.3 sur Cloud Pak for Data 5.3",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 11.5.x ant\u00e9rieures \u00e0 11.5.9 sans le correctif de s\u00e9curit\u00e9 #66394",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 version 12.1.3 sans le correctif de s\u00e9curit\u00e9 #71609",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Big SQL on Cloud Pak for Data versions 7.6 sur Cloud Pak for Data 4.8 ant\u00e9rieures \u00e0 8.3 sur Cloud Pak for Data 5.3",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Big SQL on Cloud Pak for Data versions 8.2 sur Cloud Pak for Data 5.2 ant\u00e9rieures \u00e0 8.3 sur Cloud Pak for Data 5.3",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 26.0.0.1 sans le correctif de s\u00e9curit\u00e9 PH69485 ou ant\u00e9rieures \u00e0 26.0.0.2 (disponibilit\u00e9 pr\u00e9vue pour le premier trimestre 2026)",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP14 IF04",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Big SQL on Cloud Pak for Data versions 7.7 sur Cloud Pak for Data 5.0 ant\u00e9rieures \u00e0 8.3 sur Cloud Pak for Data 5.3",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-2534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2534"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2016-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2193"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2022-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2596"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46762"
},
{
"name": "CVE-2025-36131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36131"
},
{
"name": "CVE-2025-56200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-56200"
},
{
"name": "CVE-2024-37071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37071"
},
{
"name": "CVE-2019-9515",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9515"
},
{
"name": "CVE-2025-36384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36384"
},
{
"name": "CVE-2024-47118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47118"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2025-48050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48050"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-9514",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9514"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-57810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57810"
},
{
"name": "CVE-2024-41761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41761"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-36136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36136"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2022-33987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2025-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36006"
},
{
"name": "CVE-2024-48949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
},
{
"name": "CVE-2025-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36186"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2025-12758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12758"
},
{
"name": "CVE-2025-6493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6493"
},
{
"name": "CVE-2025-33012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33012"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2025-25977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25977"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2025-11083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11083"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54313"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2025-58457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58457"
},
{
"name": "CVE-2025-66221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66221"
},
{
"name": "CVE-2022-22968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22968"
},
{
"name": "CVE-2025-39697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39697"
},
{
"name": "CVE-2025-29907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29907"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2024-41762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41762"
},
{
"name": "CVE-2021-23413",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23413"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2019-9517",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9517"
},
{
"name": "CVE-2022-41721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41721"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-57965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57965"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2024-40679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40679"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2019-9518",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9518"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2025-14914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14914"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-47072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47072"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2022-37599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2019-9512",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9512"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2024-45663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45663"
},
{
"name": "CVE-2025-33134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33134"
},
{
"name": "CVE-2019-9513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9513"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2025-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36185"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2026-01-30T00:00:00",
"last_revision_date": "2026-01-30T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0109",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 5691194",
"url": "https://www.ibm.com/support/pages/node/5691194"
},
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7258104",
"url": "https://www.ibm.com/support/pages/node/7258104"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7258234",
"url": "https://www.ibm.com/support/pages/node/7258234"
},
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7258110",
"url": "https://www.ibm.com/support/pages/node/7258110"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257910",
"url": "https://www.ibm.com/support/pages/node/7257910"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257899",
"url": "https://www.ibm.com/support/pages/node/7257899"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7258042",
"url": "https://www.ibm.com/support/pages/node/7258042"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257904",
"url": "https://www.ibm.com/support/pages/node/7257904"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257903",
"url": "https://www.ibm.com/support/pages/node/7257903"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257901",
"url": "https://www.ibm.com/support/pages/node/7257901"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257898",
"url": "https://www.ibm.com/support/pages/node/7257898"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257900",
"url": "https://www.ibm.com/support/pages/node/7257900"
},
{
"published_at": "2026-01-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257978",
"url": "https://www.ibm.com/support/pages/node/7257978"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257902",
"url": "https://www.ibm.com/support/pages/node/7257902"
},
{
"published_at": "2026-01-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257519",
"url": "https://www.ibm.com/support/pages/node/7257519"
},
{
"published_at": "2026-01-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7258331",
"url": "https://www.ibm.com/support/pages/node/7258331"
},
{
"published_at": "2026-01-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257633",
"url": "https://www.ibm.com/support/pages/node/7257633"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7258232",
"url": "https://www.ibm.com/support/pages/node/7258232"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7258224",
"url": "https://www.ibm.com/support/pages/node/7258224"
},
{
"published_at": "2026-01-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257678",
"url": "https://www.ibm.com/support/pages/node/7257678"
}
]
}
CERTFR-2024-AVI-0086
Vulnerability from certfr_avis - Published: 2024-02-01 - Updated: 2024-02-01
De multiples vulnérabilités ont été découvertes dans Juniper. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Secure Analytics - Log Collector versions antérieures à v1.8.4 | ||
| Juniper Networks | Secure Analytics | Secure Analytics - Deployment Intelligence App versions antérieures à 3.0.12 | ||
| Juniper Networks | Secure Analytics | Secure Analytics versions antérieures à 7.5.0 UP7 | ||
| Juniper Networks | Secure Analytics | Secure Analytics - User Behavior Analytics Application add-on versions antérieures à 4.1.14 | ||
| Juniper Networks | Secure Analytics | Secure Analytics - SOAR Plugin App versions antérieures à 5.3.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Secure Analytics - Log Collector versions ant\u00e9rieures \u00e0 v1.8.4",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics - Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.12",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP7",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics - User Behavior Analytics Application add-on versions ant\u00e9rieures \u00e0 4.1.14",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics - SOAR Plugin App versions ant\u00e9rieures \u00e0 5.3.1",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38020"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2023-46136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-21611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21611"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38019"
},
{
"name": "CVE-2023-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38263"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
}
],
"initial_release_date": "2024-02-01T00:00:00",
"last_revision_date": "2024-02-01T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0086",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA76715 du 1 f\u00e9vrier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-7-5-0-UP7-IF04?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA76718 du 1 f\u00e9vrier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications?language=en_US"
}
]
}
CERTFR-2024-AVI-0630
Vulnerability from certfr_avis - Published: 2024-07-26 - Updated: 2024-07-26
De multiples vulnérabilités ont été découvertes dans IBM QRadar. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar Pulse App versions ant\u00e9rieures \u00e0 2.2.14",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Data Synchronization App versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Network Packet Capture versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 Update Package 8",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3721"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2021-23436",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23436"
},
{
"name": "CVE-2022-37603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2016-10540",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10540"
},
{
"name": "CVE-2020-28477",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28477"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2022-43441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43441"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-0842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0842"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-27088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27088"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2021-24033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24033"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2024-31905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31905"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2018-16487",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16487"
},
{
"name": "CVE-2021-42740",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42740"
},
{
"name": "CVE-2016-10538",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10538"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2023-32233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2021-3757",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3757"
}
],
"initial_release_date": "2024-07-26T00:00:00",
"last_revision_date": "2024-07-26T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0630",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar",
"vendor_advisories": [
{
"published_at": "2024-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7161462",
"url": "https://www.ibm.com/support/pages/node/7161462"
},
{
"published_at": "2024-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160961",
"url": "https://www.ibm.com/support/pages/node/7160961"
},
{
"published_at": "2024-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160858",
"url": "https://www.ibm.com/support/pages/node/7160858"
}
]
}
CERTFR-2024-AVI-0199
Vulnerability from certfr_avis - Published: 2024-03-08 - Updated: 2024-03-08
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | WebSphere Service Registry and Repository versions 8.5.x antérieures à WSRR V8.5.6.3_IJ40949_IJ45702_IJ48644_IJ48939_IJ48940 | ||
| IBM | WebSphere | WebSphere Service Registry and Repository Studio versions 8.5.x sans le dernier correctif de sécurité V8.5.6.3_IJ50069 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.19.0 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.x.x antérieures à 1.10.19.0 | ||
| IBM | Sterling | Sterling External Authentication Server versions antérieures à 6.0.3 sans le correctif de sécurité iFix 10 | ||
| IBM | Sterling | Sterling External Authentication Server versions antérieures à 6.1.0 sans le correctif de sécurité iFix 06 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Service Registry and Repository versions 8.5.x ant\u00e9rieures \u00e0 WSRR V8.5.6.3_IJ40949_IJ45702_IJ48644_IJ48939_IJ48940",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Service Registry and Repository Studio versions 8.5.x sans le dernier correctif de s\u00e9curit\u00e9 V8.5.6.3_IJ50069",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.19.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.19.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions ant\u00e9rieures \u00e0 6.0.3 sans le correctif de s\u00e9curit\u00e9 iFix 10",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions ant\u00e9rieures \u00e0 6.1.0 sans le correctif de s\u00e9curit\u00e9 iFix 06",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1099"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2018-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8088"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2020-15106",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15106"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2021-32760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32760"
},
{
"name": "CVE-2023-34478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34478"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2021-21334",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21334"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2024-23829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23829"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-47248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47248"
},
{
"name": "CVE-2018-16886",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16886"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-22602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22602"
},
{
"name": "CVE-2021-41103",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41103"
},
{
"name": "CVE-2023-40743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40743"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2017-16137",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16137"
},
{
"name": "CVE-2024-23334",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23334"
}
],
"initial_release_date": "2024-03-08T00:00:00",
"last_revision_date": "2024-03-08T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0199",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7130806 du 07 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7130806"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7129989 du 06 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7129989"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7129833 du 04 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7129833"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7129327 du 01 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7129327"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7129821 du 04 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7129821"
}
]
}
CERTFR-2024-AVI-0113
Vulnerability from certfr_avis - Published: 2024-02-09 - Updated: 2024-02-09
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | Sterling File Gateway version 6.1.x antérieures à 6.1.2.4 | ||
| IBM | Sterling | Sterling B2B Integrator version 6.0.x antérieures à 6.0.3.9 | ||
| IBM | MaaS360 | MaaS360 Cloud Extender Agent versions antérieures à 3.000.300.025 | ||
| IBM | MaaS360 | MaaS360 Mobile Enterprise Gateway versions antérieures à 3.000.400 | ||
| IBM | Sterling | Sterling File Gateway version 6.0.x antérieures à 6.0.3.9 | ||
| IBM | QRadar | QRadar Pulse App versions antérieures à 2.2.12 | ||
| IBM | Sterling | Sterling B2B Integrator version 6.1.x antérieures à 6.1.2.4 | ||
| IBM | MaaS360 | MaaS360 VPN versions antérieures à 3.000.400 | ||
| IBM | Sterling | Sterling Transformation Extender versions 10.1.0, 10.1.1, 10.1.2 et 11.0.0 sans le correctif de sécurité APAR PH58718 | ||
| IBM | Sterling Control Center | Sterling Control Center versions antérieures à 6.3.0.0 iFix04 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling File Gateway version 6.1.x ant\u00e9rieures \u00e0 6.1.2.4",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling B2B Integrator version 6.0.x ant\u00e9rieures \u00e0 6.0.3.9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "MaaS360 Cloud Extender Agent versions ant\u00e9rieures \u00e0 3.000.300.025",
"product": {
"name": "MaaS360",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "MaaS360 Mobile Enterprise Gateway versions ant\u00e9rieures \u00e0 3.000.400",
"product": {
"name": "MaaS360",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling File Gateway version 6.0.x ant\u00e9rieures \u00e0 6.0.3.9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Pulse App versions ant\u00e9rieures \u00e0 2.2.12",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling B2B Integrator version 6.1.x ant\u00e9rieures \u00e0 6.1.2.4",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "MaaS360 VPN versions ant\u00e9rieures \u00e0 3.000.400",
"product": {
"name": "MaaS360",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender versions 10.1.0, 10.1.1, 10.1.2 et 11.0.0 sans le correctif de s\u00e9curit\u00e9 APAR PH58718",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions ant\u00e9rieures \u00e0 6.3.0.0 iFix04",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-46308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46308"
},
{
"name": "CVE-2010-3300",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3300"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2023-46849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46849"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2023-34396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34396"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2023-34149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34149"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-46850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46850"
}
],
"initial_release_date": "2024-02-09T00:00:00",
"last_revision_date": "2024-02-09T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0113",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7116082 du 07 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7116082"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7115287 du 06 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7115287"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7114777 du 05 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7114777"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7116078 du 07 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7116078"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7116073 du 07 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7116073"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7116050 du 07 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7116050"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7116376 du 09 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7116376"
}
]
}
CERTFR-2024-AVI-0015
Vulnerability from certfr_avis - Published: 2024-01-10 - Updated: 2024-01-10
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | N/A | Splunk User Behavior Analytics (UBA) versions antérieures à 5.2.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Security (ES) versions antérieures à 7.1.2 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk User Behavior Analytics (UBA) versions ant\u00e9rieures \u00e0 5.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Security (ES) versions ant\u00e9rieures \u00e0 7.1.2",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2015-5237",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
},
{
"name": "CVE-2022-37603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
},
{
"name": "CVE-2021-23446",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23446"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-32695",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32695"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2024-22164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22164"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2024-22165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22165"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2022-37599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
}
],
"initial_release_date": "2024-01-10T00:00:00",
"last_revision_date": "2024-01-10T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0015",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSplunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0103 du 09 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0103"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0104 du 09 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0104"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0102 du 09 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0102"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0101 du 09 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0101"
}
]
}
CERTFR-2023-AVI-0705
Vulnerability from certfr_avis - Published: 2023-09-01 - Updated: 2023-09-01
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | IBM Sterling Secure Proxy versions versions antérieures à 6.0.3 sans le correctif de sécurité iFix08 | ||
| IBM | Sterling | IBM Sterling External Authentication Server versions antérieures à 6.0.3 sans le correctif de sécurité iFix 08 | ||
| IBM | Sterling | IBM Sterling Secure Proxy versions versions antérieures à 6.1.0 sans le correctif de sécurité GA | ||
| IBM | QRadar User Behavior Analytics | IBM QRadar User Behavior Analytics versions antérieures à 4.1.13 | ||
| IBM | Tivoli Monitoring | IBM Tivoli Monitoring versions 6.x.x antérieures à 6.3.0.7 Plus Service Pack 5 | ||
| IBM | Cloud Pak | IBM Cognos Dashboards on Cloud Pak for Data versions 4.7.x antérieures à 4.7.2 | ||
| IBM | Sterling | IBM Sterling External Authentication Server versions antérieures à 6.1.0 sans le correctif de sécurité iFix 04 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Secure Proxy versions versions ant\u00e9rieures \u00e0 6.0.3 sans le correctif de s\u00e9curit\u00e9 iFix08",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling External Authentication Server versions ant\u00e9rieures \u00e0 6.0.3 sans le correctif de s\u00e9curit\u00e9 iFix 08",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Secure Proxy versions versions ant\u00e9rieures \u00e0 6.1.0 sans le correctif de s\u00e9curit\u00e9 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar User Behavior Analytics versions ant\u00e9rieures \u00e0 4.1.13",
"product": {
"name": "QRadar User Behavior Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Tivoli Monitoring versions 6.x.x ant\u00e9rieures \u00e0 6.3.0.7 Plus Service Pack 5",
"product": {
"name": "Tivoli Monitoring",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Dashboards on Cloud Pak for Data versions 4.7.x ant\u00e9rieures \u00e0 4.7.2",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling External Authentication Server versions ant\u00e9rieures \u00e0 6.1.0 sans le correctif de s\u00e9curit\u00e9 iFix 04",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-32213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32213"
},
{
"name": "CVE-2023-32697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32697"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2020-28498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28498"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-27554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27554"
},
{
"name": "CVE-2023-1436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1436"
},
{
"name": "CVE-2021-23440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23440"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2020-13936",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-32342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32342"
},
{
"name": "CVE-2022-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40149"
},
{
"name": "CVE-2022-39161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39161"
},
{
"name": "CVE-2021-43803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43803"
},
{
"name": "CVE-2022-32222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32222"
},
{
"name": "CVE-2023-24966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24966"
},
{
"name": "CVE-2022-32212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32212"
},
{
"name": "CVE-2022-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40150"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26920"
},
{
"name": "CVE-2021-33813",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33813"
},
{
"name": "CVE-2022-45693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45693"
},
{
"name": "CVE-2023-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35890"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-32215",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32215"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-29261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29261"
},
{
"name": "CVE-2021-37699",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37699"
},
{
"name": "CVE-2023-34104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34104"
},
{
"name": "CVE-2022-45685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45685"
},
{
"name": "CVE-2023-25690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25690"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-32214",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32214"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22874"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-32338",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32338"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
}
],
"initial_release_date": "2023-09-01T00:00:00",
"last_revision_date": "2023-09-01T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0705",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029765 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029765"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029766 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029766"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7027925 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7027925"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029732 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029732"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029864 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029864"
}
]
}
CERTFR-2024-AVI-0010
Vulnerability from certfr_avis - Published: 2024-01-05 - Updated: 2024-01-05
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM OS Image pour AIX Systems versions antérieures à AIX 7.2 TL5 SP6 sur Cloud Pak System versions antérieures à V2.3.3.7 Interim Fix 01 | ||
| IBM | N/A | IBM Db2 on Cloud Pak for Data versions antérieures à v4.8 | ||
| IBM | N/A | Db2 Warehouse on Cloud Pak for Data versions antérieures à v4.8 | ||
| IBM | Db2 | IBM Db2 Web Query for i versions antérieures à 2.4.0 sans les derniers correctifs de sécurité |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM OS Image pour AIX Systems versions ant\u00e9rieures \u00e0 AIX 7.2 TL5 SP6 sur Cloud Pak System versions ant\u00e9rieures \u00e0 V2.3.3.7 Interim Fix 01",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 Web Query for i versions ant\u00e9rieures \u00e0 2.4.0 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-20862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20862"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-20861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20861"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2022-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41946"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-43646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43646"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-20863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20863"
},
{
"name": "CVE-2017-15708",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15708"
},
{
"name": "CVE-2023-20860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20860"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
}
],
"initial_release_date": "2024-01-05T00:00:00",
"last_revision_date": "2024-01-05T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0010",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7105215 du 03 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7105215"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7105138 du 03 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7105138"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7104447 du 02 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7104447"
}
]
}
CERTFR-2026-AVI-0065
Vulnerability from certfr_avis - Published: 2026-01-21 - Updated: 2026-01-21
De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Atlassian | Jira | Jira Software Server versions 11.3.x antérieures à 11.3.0 | ||
| Atlassian | Confluence | Confluence Server versions antérieures à 8.5.31 | ||
| Atlassian | Jira | Jira Service Management Data Center versions antérieures à 5.12.29 | ||
| Atlassian | Jira | Jira Service Management Server versions 11.x antérieures à 11.2.1 | ||
| Atlassian | Jira | Jira Service Management Data Center versions 11.x antérieures à 11.2.1 | ||
| Atlassian | Jira | Jira Software Data Center versions 11.2.x antérieures à 11.2.1 | ||
| Atlassian | Jira | Jira Software Server versions 11.2.x antérieures à 11.2.1 | ||
| Atlassian | Jira | Jira Software Data Center versions 10.x antérieures à 10.3.16 | ||
| Atlassian | Jira | Jira Service Management Server versions 10.x antérieures à 10.3.16 | ||
| Atlassian | Jira | Jira Service Management Server versions 11.3.x antérieures à 11.3.0 | ||
| Atlassian | Confluence | Confluence Server versions 9.x antérieures à 9.2.13 | ||
| Atlassian | Confluence | Confluence Data Center versions 10.x antérieures à 10.2.2 | ||
| Atlassian | Jira | Jira Software Data Center versions antérieures à 9.12.26 | ||
| Atlassian | Jira | Jira Service Management Data Center versions 11.3.x antérieures à 11.3.1 | ||
| Atlassian | Confluence | Confluence Data Center versions antérieures à 8.5.31 | ||
| Atlassian | Jira | Jira Software Server versions antérieures à 9.12.26 | ||
| Atlassian | Confluence | Confluence Data Center versions 9.x antérieures à 9.2.13 | ||
| Atlassian | Jira | Jira Service Management Data Center versions 10.x antérieures à 10.3.16 | ||
| Atlassian | Jira | Jira Software Server versions 10.x antérieures à 10.3.16 | ||
| Atlassian | Jira | Jira Service Management Server versions antérieures à 5.12.29 | ||
| Atlassian | Jira | Jira Software Data Center versions 11.3.x antérieures à 11.3.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Jira Software Server versions 11.3.x ant\u00e9rieures \u00e0 11.3.0",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.31",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 5.12.29",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Server versions 11.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions 11.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Server versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions 10.x ant\u00e9rieures \u00e0 10.3.16",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Server versions 10.x ant\u00e9rieures \u00e0 10.3.16",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Server versions 11.3.x ant\u00e9rieures \u00e0 11.3.0",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions 9.x ant\u00e9rieures \u00e0 9.2.13",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 10.x ant\u00e9rieures \u00e0 10.2.2",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.26",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions 11.3.x ant\u00e9rieures \u00e0 11.3.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.31",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.26",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 9.x ant\u00e9rieures \u00e0 9.2.13",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions 10.x ant\u00e9rieures \u00e0 10.3.16",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Server versions 10.x ant\u00e9rieures \u00e0 10.3.16",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 5.12.29",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions 11.3.x ant\u00e9rieures \u00e0 11.3.0",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9287"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2025-66516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66516"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2021-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3807"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2022-45693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45693"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-53689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53689"
}
],
"initial_release_date": "2026-01-21T00:00:00",
"last_revision_date": "2026-01-21T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0065",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
"vendor_advisories": [
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26667",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26667"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16497",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16497"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16496",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16496"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101827",
"url": "https://jira.atlassian.com/browse/CONFSERVER-101827"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26665",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26665"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16485",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16485"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26661",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26661"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16491",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16491"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101878",
"url": "https://jira.atlassian.com/browse/CONFSERVER-101878"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16501",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16501"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26663",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26663"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16503",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16503"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26662",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26662"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16459",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16459"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26654",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26654"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26656",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26656"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101872",
"url": "https://jira.atlassian.com/browse/CONFSERVER-101872"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16502",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16502"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101842",
"url": "https://jira.atlassian.com/browse/CONFSERVER-101842"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16499",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16499"
},
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16465",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16465"
}
]
}
CERTFR-2024-AVI-0145
Vulnerability from certfr_avis - Published: 2024-02-16 - Updated: 2024-02-16
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | N/A | IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions antérieures à v4.8.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF05 | ||
| IBM | QRadar | IBM QRadar Use Case Manager App versions antérieures à 3.9.0 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | WebSphere | IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.1.x.x antérieures à 6.1.0.23 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.3.x.x antérieures à 6.3.0.6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.2.x.x antérieures à 6.2.0.22 | ||
| IBM | Db2 | IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | Cloud Pak | IBM Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.x.x antérieures à 5.1.2.15 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | QRadar WinCollect Agent | IBM QRadar WinCollect Agent versions 10.0.x antérieures à 10.1.9 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.3.x antérieures à 5.1.9.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF05",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.x.x ant\u00e9rieures \u00e0 5.1.2.15",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar WinCollect Agent versions 10.0.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.3.x ant\u00e9rieures \u00e0 5.1.9.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2021-41190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41190"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29244"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2020-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8244"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2023-34054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34054"
},
{
"name": "CVE-2023-34053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34053"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47145"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-46308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46308"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-23541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23541"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2023-49081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49081"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-22190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
},
{
"name": "CVE-2023-4586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4586"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2023-47152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47152"
},
{
"name": "CVE-2023-49082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49082"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47141"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2023-27859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27859"
},
{
"name": "CVE-2023-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47158"
},
{
"name": "CVE-2023-36665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36665"
},
{
"name": "CVE-2022-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23529"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2022-23539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23539"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2022-23540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23540"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50308"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2023-45193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45193"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2020-29510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29510"
},
{
"name": "CVE-2023-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47746"
},
{
"name": "CVE-2023-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34062"
},
{
"name": "CVE-2023-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47747"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
}
],
"initial_release_date": "2024-02-16T00:00:00",
"last_revision_date": "2024-02-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0145",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117872 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117872"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118592 du 16 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118592"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117873 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117873"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118289 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118289"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118351 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118351"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117821 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117821"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117883 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117883"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117881 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117881"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117884 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117884"
}
]
}
CERTFR-2026-AVI-0314
Vulnerability from certfr_avis - Published: 2026-03-18 - Updated: 2026-03-18
De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Atlassian | Jira | Jira Software Server versions antérieures à 10.3.17 | ||
| Atlassian | Jira | Jira Software Server versions antérieures à 11.3.2 | ||
| Atlassian | Confluence | Confluence Data Center versions antérieures à 10.2.7 | ||
| Atlassian | Jira | Jira Software Data Center versions antérieures à 11.3.3 | ||
| Atlassian | Confluence | Confluence Server versions antérieures à 9.0.2 | ||
| Atlassian | Jira | Jira Service Management Data Center versions antérieures à 11.3.3 | ||
| Atlassian | Confluence | Confluence Data Center versions antérieures à 9.0.2 | ||
| Atlassian | Jira | Jira Software Data Center versions antérieures à 10.3.18 | ||
| Atlassian | Confluence | Confluence Server versions antérieures à 9.2.15 | ||
| Atlassian | Jira | Jira Service Management Server versions antérieures à 11.3.3 | ||
| Atlassian | Confluence | Confluence Data Center versions antérieures à 9.2.15 | ||
| Atlassian | Confluence | Confluence Server versions antérieures à 10.2.7 | ||
| Atlassian | Jira | Jira Service Management Server versions antérieures à 10.3.17 | ||
| Atlassian | Jira | Jira Service Management Data Center versions antérieures à 10.3.18 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.3.17",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Server versions ant\u00e9rieures \u00e0 11.3.2",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions ant\u00e9rieures \u00e0 10.2.7",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 11.3.3",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions ant\u00e9rieures \u00e0 9.0.2",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 11.3.3",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.0.2",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.3.18",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions ant\u00e9rieures \u00e0 9.2.15",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 11.3.3",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.2.15",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions ant\u00e9rieures \u00e0 10.2.7",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.3.17",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.18",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2022-25927",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25927"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
}
],
"initial_release_date": "2026-03-18T00:00:00",
"last_revision_date": "2026-03-18T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0314",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
"vendor_advisories": [
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16515",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16515"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16527",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16527"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26730",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26730"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16530",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16530"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26714",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26714"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26736",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26736"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26716",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26716"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-102542",
"url": "https://jira.atlassian.com/browse/CONFSERVER-102542"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16529",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16529"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16510",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16510"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26732",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26732"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16528",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16528"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26733",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26733"
}
]
}
CERTFR-2026-AVI-0182
Vulnerability from certfr_avis - Published: 2026-02-18 - Updated: 2026-02-18
De multiples vulnérabilités ont été découvertes dans Atlassian Confluence. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Atlassian | Confluence | Confluence Server versions 9.4.x antérieures à 9.4.0 | ||
| Atlassian | Confluence | Confluence Data Center versions 9.4.x antérieures à 9.4.0 | ||
| Atlassian | Confluence | Confluence Data Center versions 9.5.x antérieures à 9.5.3 | ||
| Atlassian | Confluence | Confluence Server versions 10.1.x antérieures à 10.1.0 | ||
| Atlassian | Confluence | Confluence Server versions 10.0.x antérieures à 10.0.2 | ||
| Atlassian | Confluence | Confluence Data Center versions 10.0.x antérieures à 10.0.2 | ||
| Atlassian | Confluence | Confluence Server versions 9.2.x antérieures à 9.2.7 | ||
| Atlassian | Confluence | Confluence Data Center versions antérieures à 8.5.10 | ||
| Atlassian | Confluence | Confluence Server versions 9.5.x antérieures à 9.5.3 | ||
| Atlassian | Confluence | Confluence Data Center versions 10.1.x antérieures à 10.1.0 | ||
| Atlassian | Confluence | Confluence Data Center versions 10.2.x antérieures à 10.2.6 | ||
| Atlassian | Confluence | Confluence Server versions antérieures à 8.5.10 | ||
| Atlassian | Confluence | Confluence Server versions 10.2.x antérieures à 10.2.6 | ||
| Atlassian | Confluence | Confluence Data Center versions 9.2.x antérieures à 9.2.15 | ||
| Atlassian | Confluence | Confluence Data Center versions 9.3.x antérieures à 9.3.1 | ||
| Atlassian | Confluence | Confluence Server versions 9.3.x antérieures à 9.3.1 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Confluence Server versions 9.4.x ant\u00e9rieures \u00e0 9.4.0",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 9.4.x ant\u00e9rieures \u00e0 9.4.0",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 9.5.x ant\u00e9rieures \u00e0 9.5.3",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions 10.1.x ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions 10.0.x ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 10.0.x ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.10",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions 9.5.x ant\u00e9rieures \u00e0 9.5.3",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 10.1.x ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 10.2.x ant\u00e9rieures \u00e0 10.2.6",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.10",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions 10.2.x ant\u00e9rieures \u00e0 10.2.6",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 9.2.x ant\u00e9rieures \u00e0 9.2.15",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 9.3.x ant\u00e9rieures \u00e0 9.3.1",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions 9.3.x ant\u00e9rieures \u00e0 9.3.1",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2022-25927",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25927"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2025-59343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59343"
}
],
"initial_release_date": "2026-02-18T00:00:00",
"last_revision_date": "2026-02-18T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0182",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Atlassian Confluence. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Atlassian Confluence",
"vendor_advisories": [
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-102185",
"url": "https://jira.atlassian.com/browse/CONFSERVER-102185"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101930",
"url": "https://jira.atlassian.com/browse/CONFSERVER-101930"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-102184",
"url": "https://jira.atlassian.com/browse/CONFSERVER-102184"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-102186",
"url": "https://jira.atlassian.com/browse/CONFSERVER-102186"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-102193",
"url": "https://jira.atlassian.com/browse/CONFSERVER-102193"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-102132",
"url": "https://jira.atlassian.com/browse/CONFSERVER-102132"
}
]
}
CERTFR-2025-AVI-0627
Vulnerability from certfr_avis - Published: 2025-07-25 - Updated: 2025-07-25
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | WebSphere Remote Server sans le dernier correctif de sécurité | ||
| IBM | QRadar | Security QRadar Network Threat Analytics versions antérieures à 1.4.0 | ||
| IBM | Db2 | DB2 Data Management Console versions antérieures à 5.1.2 sur CPD | ||
| IBM | Db2 Query Management Facility | DB2 Query Management Facility versions 13.1.x sans le dernier correctif de sécurité | ||
| IBM | Db2 | DB2 Data Management Console versions antérieures à 3.1.13.1 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Remote Server sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar Network Threat Analytics versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console versions ant\u00e9rieures \u00e0 5.1.2 sur CPD",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Query Management Facility versions 13.1.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Db2 Query Management Facility",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console versions ant\u00e9rieures \u00e0 3.1.13.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-5629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5629"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2023-46298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46298"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2024-1135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1135"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3121"
},
{
"name": "CVE-2024-52046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52046"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2024-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
},
{
"name": "CVE-2025-2900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2900"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2023-32305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32305"
}
],
"initial_release_date": "2025-07-25T00:00:00",
"last_revision_date": "2025-07-25T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0627",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240466",
"url": "https://www.ibm.com/support/pages/node/7240466"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240530",
"url": "https://www.ibm.com/support/pages/node/7240530"
},
{
"published_at": "2025-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240471",
"url": "https://www.ibm.com/support/pages/node/7240471"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240267",
"url": "https://www.ibm.com/support/pages/node/7240267"
},
{
"published_at": "2025-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240474",
"url": "https://www.ibm.com/support/pages/node/7240474"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240250",
"url": "https://www.ibm.com/support/pages/node/7240250"
}
]
}
CERTFR-2024-AVI-0080
Vulnerability from certfr_avis - Published: 2024-01-31 - Updated: 2024-01-31
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Add-on Builder 4.1.x versions ant\u00e9rieures \u00e0 4.1.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-46230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46230"
},
{
"name": "CVE-2023-46231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46231"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
}
],
"initial_release_date": "2024-01-31T00:00:00",
"last_revision_date": "2024-01-31T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0080",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Splunk\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0111 du 30 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0111"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0110 du 30 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0110"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0112 du 30 janvier 2024",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0112"
}
]
}
CERTFR-2024-AVI-0090
Vulnerability from certfr_avis - Published: 2024-02-02 - Updated: 2024-02-02
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS), une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | IBM Sterling Transformation Extender version 10.1.1 sans le correctif de sécurité APAR PH58716 | ||
| IBM | Sterling Control Center | IBM Sterling Control Center versions 6.3.x.x antérieures à 6.3.0.0 iFix05 | ||
| IBM | QRadar User Behavior Analytics | QRadar User Behavior Analytics versions antérieures à 4.1.14 | ||
| IBM | QRadar Assistant | IBM QRadar Assistant versions antérieures à 3.6.1 | ||
| IBM | Sterling | IBM Sterling Transformation Extender version 11.0 sans le correctif de sécurité APAR PH58716 | ||
| IBM | Sterling | IBM Sterling Transformation Extender version 10.1.2 sans le correctif de sécurité APAR PH58716 | ||
| IBM | Sterling | IBM Sterling Transformation Extender version 10.1.0 sans le correctif de sécurité APAR PH58716 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Transformation Extender version 10.1.1 sans le correctif de s\u00e9curit\u00e9 APAR PH58716",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Control Center versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.0 iFix05",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar User Behavior Analytics versions ant\u00e9rieures \u00e0 4.1.14",
"product": {
"name": "QRadar User Behavior Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Assistant versions ant\u00e9rieures \u00e0 3.6.1",
"product": {
"name": "QRadar Assistant",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Transformation Extender version 11.0 sans le correctif de s\u00e9curit\u00e9 APAR PH58716",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Transformation Extender version 10.1.2 sans le correctif de s\u00e9curit\u00e9 APAR PH58716",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Transformation Extender version 10.1.0 sans le correctif de s\u00e9curit\u00e9 APAR PH58716",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0105"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-32342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32342"
},
{
"name": "CVE-2022-25927",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25927"
},
{
"name": "CVE-2018-25031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25031"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2023-40743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40743"
}
],
"initial_release_date": "2024-02-02T00:00:00",
"last_revision_date": "2024-02-02T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0090",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une injection de code indirecte \u00e0\ndistance (XSS), une ex\u00e9cution de code arbitraire \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7114134 du 01 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7114134"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7113520 du 31 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7113520"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112498 du 30 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7112498"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7113593 du 31 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7113593"
}
]
}
CERTFR-2024-AVI-0923
Vulnerability from certfr_avis - Published: 2024-10-25 - Updated: 2024-10-25
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | Sterling Connect:Express pour UNIX versions 1.5.x antérieures à 1.5.0.17010 | ||
| IBM | QRadar | QRadar Assistant versions antérieures à 3.8.1 | ||
| IBM | Cognos Analytics | Cognos Analytics Mobile (Android) versions 1.1.x antérieures à 1.1.20 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.0.x antérieures à 6.0.3.1 GA | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.5.0 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 GA | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP4 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 GA | ||
| IBM | Cognos Analytics | Cognos Analytics Mobile (iOS) versions 1.1.x antérieures à 1.1.20 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 GA |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling Connect:Express pour UNIX versions 1.5.x ant\u00e9rieures \u00e0 1.5.0.17010",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Assistant versions ant\u00e9rieures \u00e0 3.8.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics Mobile (Android) versions 1.1.x ant\u00e9rieures \u00e0 1.1.20",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.5.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4 ",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics Mobile (iOS) versions 1.1.x ant\u00e9rieures \u00e0 1.1.20",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0144"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2023-25166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25166"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-28856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28856"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2018-12538",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12538"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2023-50312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50312"
},
{
"name": "CVE-2024-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2023-38737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38737"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2022-36943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36943"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38009"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2020-27216",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27216"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-29622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29622"
},
{
"name": "CVE-2021-40690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40690"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-45145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45145"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2023-0842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0842"
},
{
"name": "CVE-2023-22467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22467"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-43383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43383"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2018-12545",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12545"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2024-41784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41784"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2022-24834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24834"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2023-44483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44483"
},
{
"name": "CVE-2024-27270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27270"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2022-0235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0235"
},
{
"name": "CVE-2019-10241",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10241"
},
{
"name": "CVE-2022-24736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24736"
},
{
"name": "CVE-2024-25042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25042"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2020-15168",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15168"
},
{
"name": "CVE-2023-29262",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29262"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2022-24735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24735"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2012-2677",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2677"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2021-34428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34428"
}
],
"initial_release_date": "2024-10-25T00:00:00",
"last_revision_date": "2024-10-25T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0923",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173631",
"url": "https://www.ibm.com/support/pages/node/7173631"
},
{
"published_at": "2024-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174016",
"url": "https://www.ibm.com/support/pages/node/7174016"
},
{
"published_at": "2024-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174015",
"url": "https://www.ibm.com/support/pages/node/7174015"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173632",
"url": "https://www.ibm.com/support/pages/node/7173632"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7172691",
"url": "https://www.ibm.com/support/pages/node/7172691"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7172692",
"url": "https://www.ibm.com/support/pages/node/7172692"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173592",
"url": "https://www.ibm.com/support/pages/node/7173592"
},
{
"published_at": "2024-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173866",
"url": "https://www.ibm.com/support/pages/node/7173866"
}
]
}
CERTFR-2023-AVI-0956
Vulnerability from certfr_avis - Published: 2023-11-17 - Updated: 2023-11-17
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | N/A | Splunk extension pour Google Cloud Platform versions antérieures à 4.3.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.2 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.7 | ||
| Splunk | N/A | Splunk extension pour Amazon Web Services versions antérieures à 7.2.0 | ||
| Splunk | N/A | Splunk Cloud versions antérieures à 9.1.2308 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk extension pour Google Cloud Platform versions ant\u00e9rieures \u00e0 4.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.2",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.7",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk extension pour Amazon Web Services versions ant\u00e9rieures \u00e0 7.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.1.2308",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2023-46213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46213"
},
{
"name": "CVE-2023-46214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46214"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2022-31799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31799"
}
],
"initial_release_date": "2023-11-17T00:00:00",
"last_revision_date": "2023-11-17T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0956",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-11-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Splunk\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et une injection\nde code indirecte \u00e0 distance (XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1105 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1105"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1101 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1101"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1102 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1102"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1106 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1106"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1103 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1103"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1104 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1104"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1107 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1107"
}
]
}
WID-SEC-W-2023-3025
Vulnerability from csaf_certbund - Published: 2023-11-28 23:00 - Updated: 2023-12-04 23:00In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder einen Denial of Service Zustand herbeizuführen.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-3025 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-3025.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-3025 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3025"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7637 vom 2023-12-05",
"url": "https://access.redhat.com/errata/RHSA-2023:7637"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7074335"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7074317"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7070765"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7070761"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7070759"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7070755"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7067719"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7067717"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7067714"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7067704"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7067700"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7067682"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7067630"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-11-28",
"url": "https://www.ibm.com/support/pages/node/7067614"
}
],
"source_lang": "en-US",
"title": "IBM InfoSphere Information Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-12-04T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:02:10.203+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-3025",
"initial_release_date": "2023-11-28T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-11-28T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-12-04T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM InfoSphere Information Server 11.7",
"product": {
"name": "IBM InfoSphere Information Server 11.7",
"product_id": "444803",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_information_server:11.7"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-46174",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-46174"
},
{
"cve": "CVE-2023-43804",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-43642",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-43021",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-43021"
},
{
"cve": "CVE-2023-43015",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-43015"
},
{
"cve": "CVE-2023-42022",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-42022"
},
{
"cve": "CVE-2023-42019",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-42019"
},
{
"cve": "CVE-2023-42009",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-42009"
},
{
"cve": "CVE-2023-40699",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-40699"
},
{
"cve": "CVE-2023-39410",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-38268",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-38268"
},
{
"cve": "CVE-2023-34462",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2023-34462"
},
{
"cve": "CVE-2022-25883",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2022-25883"
},
{
"cve": "CVE-2021-23337",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2021-23337"
},
{
"cve": "CVE-2020-8203",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2020-8203"
},
{
"cve": "CVE-2020-28500",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese bestehen in dem Kernprodukt sowie in einigen Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"67646",
"444803"
]
},
"release_date": "2023-11-28T23:00:00.000+00:00",
"title": "CVE-2020-28500"
}
]
}
WID-SEC-W-2026-0177
Vulnerability from csaf_certbund - Published: 2026-01-20 23:00 - Updated: 2026-01-28 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Bamboo ist ein Werkzeug zur kontinuierlichen Integration und Bereitstellung, das automatisierte Builds, Tests und Freigaben in einem einzigen Arbeitsablauf verbindet.\r\nBitbucket ist ein Git-Server zur Sourcecode-Versionskontrolle.\r\nConfluence ist eine kommerzielle Wiki-Software.\r\nJira ist eine Webanwendung zur Softwareentwicklung.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira ausnutzen, um beliebigen Programmcode auszuf\u00fchren, um Sicherheitsvorkehrungen zu umgehen, um einen Denial of Service Angriff durchzuf\u00fchren, und um einen Cross-Site Scripting Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0177 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0177.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0177 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0177"
},
{
"category": "external",
"summary": "Atlassian Support Security Bulletin vom 2026-01-20",
"url": "https://confluence.atlassian.com/security/security-bulletin-january-20-2026-1712324819.html"
},
{
"category": "external",
"summary": "Deell Security Update",
"url": "https://www.dell.com/support/kbdoc/en-us/000281732/dsa-2025-075-security-update-for-dell-data-protection-advisor-for-multiple-component-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "Atlassian Bamboo, Bitbucket, Confluence und Jira: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-01-28T23:00:00.000+00:00",
"generator": {
"date": "2026-01-29T07:51:12.449+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0177",
"initial_release_date": "2026-01-20T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: EUVD-2026-4913"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Data Center \u003c12.0.2",
"product": {
"name": "Atlassian Bamboo Data Center \u003c12.0.2",
"product_id": "T050227"
}
},
{
"category": "product_version",
"name": "Data Center 12.0.2",
"product": {
"name": "Atlassian Bamboo Data Center 12.0.2",
"product_id": "T050227-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:data_center__12.0.2"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c10.2.13",
"product": {
"name": "Atlassian Bamboo Data Center \u003c10.2.13",
"product_id": "T050228"
}
},
{
"category": "product_version",
"name": "Data Center 10.2.13",
"product": {
"name": "Atlassian Bamboo Data Center 10.2.13",
"product_id": "T050228-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:data_center__10.2.13"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c9.6.21",
"product": {
"name": "Atlassian Bamboo Data Center \u003c9.6.21",
"product_id": "T050229"
}
},
{
"category": "product_version",
"name": "Data Center 9.6.21",
"product": {
"name": "Atlassian Bamboo Data Center 9.6.21",
"product_id": "T050229-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:data_center__9.6.21"
}
}
}
],
"category": "product_name",
"name": "Bamboo"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Data Center \u003c10.1.1",
"product": {
"name": "Atlassian Bitbucket Data Center \u003c10.1.1",
"product_id": "T050230"
}
},
{
"category": "product_version",
"name": "Data Center 10.1.1",
"product": {
"name": "Atlassian Bitbucket Data Center 10.1.1",
"product_id": "T050230-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:data_center__10.1.1"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c9.4.15",
"product": {
"name": "Atlassian Bitbucket Data Center \u003c9.4.15",
"product_id": "T050231"
}
},
{
"category": "product_version",
"name": "Data Center 9.4.15",
"product": {
"name": "Atlassian Bitbucket Data Center 9.4.15",
"product_id": "T050231-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:data_center__9.4.15"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c8.19.26",
"product": {
"name": "Atlassian Bitbucket Data Center \u003c8.19.26",
"product_id": "T050232"
}
},
{
"category": "product_version",
"name": "Data Center 8.19.26",
"product": {
"name": "Atlassian Bitbucket Data Center 8.19.26",
"product_id": "T050232-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:data_center__8.19.26"
}
}
}
],
"category": "product_name",
"name": "Bitbucket"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Data Center \u003c10.2.2",
"product": {
"name": "Atlassian Confluence Data Center \u003c10.2.2",
"product_id": "T050233"
}
},
{
"category": "product_version",
"name": "Data Center 10.2.2",
"product": {
"name": "Atlassian Confluence Data Center 10.2.2",
"product_id": "T050233-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:data_center__10.2.2"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c9.2.13",
"product": {
"name": "Atlassian Confluence Data Center \u003c9.2.13",
"product_id": "T050234"
}
},
{
"category": "product_version",
"name": "Data Center 9.2.13",
"product": {
"name": "Atlassian Confluence Data Center 9.2.13",
"product_id": "T050234-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:data_center__9.2.13"
}
}
}
],
"category": "product_name",
"name": "Confluence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Data Center \u003c11.3.0",
"product": {
"name": "Atlassian Jira Data Center \u003c11.3.0",
"product_id": "T050235"
}
},
{
"category": "product_version",
"name": "Data Center 11.3.0",
"product": {
"name": "Atlassian Jira Data Center 11.3.0",
"product_id": "T050235-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira:data_center__11.3.0"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c11.2.1",
"product": {
"name": "Atlassian Jira Data Center \u003c11.2.1",
"product_id": "T050236"
}
},
{
"category": "product_version",
"name": "Data Center 11.2.1",
"product": {
"name": "Atlassian Jira Data Center 11.2.1",
"product_id": "T050236-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira:data_center__11.2.1"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c10.3.16",
"product": {
"name": "Atlassian Jira Data Center \u003c10.3.16",
"product_id": "T050237"
}
},
{
"category": "product_version",
"name": "Data Center 10.3.16",
"product": {
"name": "Atlassian Jira Data Center 10.3.16",
"product_id": "T050237-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira:data_center__10.3.16"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.12.26",
"product": {
"name": "Atlassian Jira \u003c9.12.26",
"product_id": "T050238"
}
},
{
"category": "product_version",
"name": "9.12.26",
"product": {
"name": "Atlassian Jira 9.12.26",
"product_id": "T050238-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira:9.12.26"
}
}
}
],
"category": "product_name",
"name": "Jira"
}
],
"category": "vendor",
"name": "Atlassian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c19.12",
"product": {
"name": "Dell Data Protection Advisor \u003c19.12",
"product_id": "T050283"
}
},
{
"category": "product_version",
"name": "19.12",
"product": {
"name": "Dell Data Protection Advisor 19.12",
"product_id": "T050283-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:data_protection_advisor:19.12"
}
}
}
],
"category": "product_name",
"name": "Data Protection Advisor"
}
],
"category": "vendor",
"name": "Dell"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3807",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2021-3807"
},
{
"cve": "CVE-2022-25883",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2022-25883"
},
{
"cve": "CVE-2022-45693",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2022-45693"
},
{
"cve": "CVE-2024-21538",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2024-21538"
},
{
"cve": "CVE-2024-38286",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2024-38286"
},
{
"cve": "CVE-2024-45296",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2024-45296"
},
{
"cve": "CVE-2024-45801",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2024-45801"
},
{
"cve": "CVE-2025-12383",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-12383"
},
{
"cve": "CVE-2025-15284",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-15284"
},
{
"cve": "CVE-2025-27152",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-27152"
},
{
"cve": "CVE-2025-41249",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-41249"
},
{
"cve": "CVE-2025-48976",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49146",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-49146"
},
{
"cve": "CVE-2025-52434",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-52434"
},
{
"cve": "CVE-2025-52999",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2025-53689",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-53689"
},
{
"cve": "CVE-2025-54988",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-54988"
},
{
"cve": "CVE-2025-55163",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-55752",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-55752"
},
{
"cve": "CVE-2025-64775",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-64775"
},
{
"cve": "CVE-2025-66516",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-66516"
},
{
"cve": "CVE-2025-9287",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-9287"
},
{
"cve": "CVE-2025-9288",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-9288"
},
{
"cve": "CVE-2026-21569",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2026-21569"
}
]
}
WID-SEC-W-2024-0049
Vulnerability from csaf_certbund - Published: 2024-01-09 23:00 - Updated: 2025-11-18 23:00| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Splunk Enterprise ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren oder unbekannte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0049 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0049.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0049 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0049"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0101 vom 2024-01-09",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0101"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0102 vom 2024-01-09",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0102"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0103 vom 2024-01-09",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0103"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0104 vom 2024-01-09",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0104"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0112 vom 2024-01-30",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0112"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0718 vom 2024-07-02",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
},
{
"category": "external",
"summary": "Atlassian Security Bulletin - November 18 2025",
"url": "https://confluence.atlassian.com/security/security-bulletin-november-18-2025-1671463469.html"
}
],
"source_lang": "en-US",
"title": "Splunk Enterprise: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-18T23:00:00.000+00:00",
"generator": {
"date": "2025-11-19T09:42:42.231+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2024-0049",
"initial_release_date": "2024-01-09T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-01-09T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-01-30T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-07-01T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.2",
"product": {
"name": "Atlassian Bitbucket \u003c10.0.2",
"product_id": "T048675"
}
},
{
"category": "product_version",
"name": "10.0.2",
"product": {
"name": "Atlassian Bitbucket 10.0.2",
"product_id": "T048675-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:10.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.19.25 (LTS)",
"product": {
"name": "Atlassian Bitbucket \u003c8.19.25 (LTS)",
"product_id": "T048676"
}
},
{
"category": "product_version",
"name": "8.19.25 (LTS)",
"product": {
"name": "Atlassian Bitbucket 8.19.25 (LTS)",
"product_id": "T048676-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:8.19.25_%28lts%29"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.4.13 (LTS)",
"product": {
"name": "Atlassian Bitbucket \u003c9.4.13 (LTS)",
"product_id": "T048677"
}
},
{
"category": "product_version",
"name": "9.4.13 (LTS)",
"product": {
"name": "Atlassian Bitbucket 9.4.13 (LTS)",
"product_id": "T048677-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:9.4.13_%28lts%29"
}
}
}
],
"category": "product_name",
"name": "Bitbucket"
}
],
"category": "vendor",
"name": "Atlassian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Security \u003c7.3.0",
"product": {
"name": "Splunk Splunk Enterprise Security \u003c7.3.0",
"product_id": "T031923"
}
},
{
"category": "product_version",
"name": "Security 7.3.0",
"product": {
"name": "Splunk Splunk Enterprise Security 7.3.0",
"product_id": "T031923-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:security__7.3.0"
}
}
},
{
"category": "product_version_range",
"name": "Security \u003c7.2.0",
"product": {
"name": "Splunk Splunk Enterprise Security \u003c7.2.0",
"product_id": "T031924"
}
},
{
"category": "product_version",
"name": "Security 7.2.0",
"product": {
"name": "Splunk Splunk Enterprise Security 7.2.0",
"product_id": "T031924-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:security__7.2.0"
}
}
},
{
"category": "product_version_range",
"name": "Security \u003c7.1.2",
"product": {
"name": "Splunk Splunk Enterprise Security \u003c7.1.2",
"product_id": "T031925"
}
},
{
"category": "product_version",
"name": "Security 7.1.2",
"product": {
"name": "Splunk Splunk Enterprise Security 7.1.2",
"product_id": "T031925-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:security__7.1.2"
}
}
},
{
"category": "product_version_range",
"name": "UBA \u003c5.3.0",
"product": {
"name": "Splunk Splunk Enterprise UBA \u003c5.3.0",
"product_id": "T031926"
}
},
{
"category": "product_version",
"name": "UBA 5.3.0",
"product": {
"name": "Splunk Splunk Enterprise UBA 5.3.0",
"product_id": "T031926-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:uba__5.3.0"
}
}
},
{
"category": "product_version_range",
"name": "UBA \u003c5.2.1",
"product": {
"name": "Splunk Splunk Enterprise UBA \u003c5.2.1",
"product_id": "T031927"
}
},
{
"category": "product_version",
"name": "UBA 5.2.1",
"product": {
"name": "Splunk Splunk Enterprise UBA 5.2.1",
"product_id": "T031927-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:uba__5.2.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.1",
"product_id": "T033705"
}
},
{
"category": "product_version",
"name": "9.2.1",
"product": {
"name": "Splunk Splunk Enterprise 9.2.1",
"product_id": "T033705-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.4",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.4",
"product_id": "T033718"
}
},
{
"category": "product_version",
"name": "9.1.4",
"product": {
"name": "Splunk Splunk Enterprise 9.1.4",
"product_id": "T033718-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.9",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.9",
"product_id": "T033720"
}
},
{
"category": "product_version",
"name": "9.0.9",
"product": {
"name": "Splunk Splunk Enterprise 9.0.9",
"product_id": "T033720-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.9"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-5237",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2015-5237"
},
{
"cve": "CVE-2021-23446",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2021-23446"
},
{
"cve": "CVE-2022-25883",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2022-25883"
},
{
"cve": "CVE-2022-3171",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2022-3171"
},
{
"cve": "CVE-2022-3509",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2022-3509"
},
{
"cve": "CVE-2022-3510",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2022-3510"
},
{
"cve": "CVE-2022-37599",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2022-37599"
},
{
"cve": "CVE-2022-37601",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2022-37601"
},
{
"cve": "CVE-2022-37603",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2022-37603"
},
{
"cve": "CVE-2022-46175",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2022-46175"
},
{
"cve": "CVE-2023-2976",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-32695",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2023-32695"
},
{
"cve": "CVE-2023-45133",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031926",
"T031925",
"T031927",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2023-45133"
},
{
"cve": "CVE-2024-22164",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031925",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2024-22164"
},
{
"cve": "CVE-2024-22165",
"product_status": {
"known_affected": [
"T033720",
"T033718",
"T031924",
"T031923",
"T033705",
"T031925",
"T048677",
"T048676",
"T048675"
]
},
"release_date": "2024-01-09T23:00:00.000+00:00",
"title": "CVE-2024-22165"
}
]
}
WID-SEC-W-2024-1944
Vulnerability from csaf_certbund - Published: 2024-08-28 22:00 - Updated: 2025-10-23 22:00{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat multicluster engine for Kubernetes ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1944 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1944.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1944 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1944"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5955 vom 2024-08-28",
"url": "https://access.redhat.com/errata/RHSA-2024:5955"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6044 vom 2024-08-30",
"url": "https://access.redhat.com/errata/RHSA-2024:6044"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19094 vom 2025-10-24",
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
}
],
"source_lang": "en-US",
"title": "Red Hat multicluster engine for Kubernetes: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-10-23T22:00:00.000+00:00",
"generator": {
"date": "2025-10-24T08:33:33.748+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1944",
"initial_release_date": "2024-08-28T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-08-28T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-08-29T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Advanced Cluster Management for Kubernetes 2",
"product": {
"name": "Red Hat Enterprise Linux Advanced Cluster Management for Kubernetes 2",
"product_id": "T027573",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_management_for_kubernetes_2"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "multicluster engine for Kubernetes 1",
"product": {
"name": "Red Hat OpenShift multicluster engine for Kubernetes 1",
"product_id": "T037181",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:multicluster_engine_for_kubernetes_1"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"product_status": {
"known_affected": [
"67646",
"T037181",
"T027573"
]
},
"release_date": "2024-08-28T22:00:00.000+00:00",
"title": "CVE-2022-25883"
}
]
}
WID-SEC-W-2023-2964
Vulnerability from csaf_certbund - Published: 2023-11-16 23:00 - Updated: 2025-07-24 22:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren, um Code auszuf\u00fchren und um nicht n\u00e4her spezifizierte Auswirkungen zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2964 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2964.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2964 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2964"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1103 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1103"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1104 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1104"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1101 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1101"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1102 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1102"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1105 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1105"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1105 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1106"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1107 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1107"
},
{
"category": "external",
"summary": "PoC auf Nathans Security Blog vom 2023-11-16",
"url": "https://blog.hrncirik.net/cve-2023-46214-analysis"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7101062 vom 2023-12-21",
"url": "https://aix.software.ibm.com/aix/efixes/security/python_advisory7.asc"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2387 vom 2024-01-10",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2387.html"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0109 vom 2024-01-22",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0109"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0464 vom 2024-01-25",
"url": "https://access.redhat.com/errata/RHSA-2024:0464"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7117884 vom 2024-02-14",
"url": "https://www.ibm.com/support/pages/node/7117884"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1155 vom 2024-03-06",
"url": "https://access.redhat.com/errata/RHSA-2024:1155"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1383 vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7148094 vom 2024-04-11",
"url": "https://www.ibm.com/support/pages/node/7148094"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-2988.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-012 vom 2024-07-02",
"url": "https://www.dell.com/support/kbdoc/de-de/000226582/dsa-2024-012-security-update-for-dell-networker-virtual-edition-networker-management-console-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0718 vom 2024-07-02",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0801 vom 2024-08-12",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0801"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1012 vom 2024-10-14",
"url": "https://advisory.splunk.com//advisories/SVD-2024-1012"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-6AA3B5248F vom 2024-12-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-6aa3b5248f"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-C4377D35E6 vom 2024-12-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c4377d35e6"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-D335B971E7 vom 2024-12-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-d335b971e7"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11189 vom 2024-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2024-11189.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0892 vom 2025-02-03",
"url": "https://access.redhat.com/errata/RHSA-2025:0892"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7240431"
}
],
"source_lang": "en-US",
"title": "Splunk Enterprise: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-07-24T22:00:00.000+00:00",
"generator": {
"date": "2025-07-25T07:12:01.755+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-2964",
"initial_release_date": "2023-11-16T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-11-16T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-11-27T23:00:00.000+00:00",
"number": "2",
"summary": "PoC aufgenommen"
},
{
"date": "2023-12-21T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-01-09T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-01-22T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-01-25T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-02-14T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-03-05T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-03-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-04-11T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-07-01T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Dell und Splunk-SVD aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-02T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-24T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "19"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "1139691",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version",
"name": "Operator",
"product": {
"name": "IBM MQ Operator",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
}
],
"category": "product_name",
"name": "MQ"
},
{
"branches": [
{
"category": "product_version",
"name": "7.5",
"product": {
"name": "IBM QRadar SIEM 7.5",
"product_id": "T022954",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version",
"name": "4.1",
"product": {
"name": "IBM VIOS 4.1",
"product_id": "1522854",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Splunk Splunk Enterprise",
"product": {
"name": "Splunk Splunk Enterprise",
"product_id": "T008911",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.7",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.7",
"product_id": "T031266"
}
},
{
"category": "product_version",
"name": "9.0.7",
"product": {
"name": "Splunk Splunk Enterprise 9.0.7",
"product_id": "T031266-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.2",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.2",
"product_id": "T031267"
}
},
{
"category": "product_version",
"name": "9.1.2",
"product": {
"name": "Splunk Splunk Enterprise 9.1.2",
"product_id": "T031267-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.8",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.8",
"product_id": "T032269"
}
},
{
"category": "product_version",
"name": "9.0.8",
"product": {
"name": "Splunk Splunk Enterprise 9.0.8",
"product_id": "T032269-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.3",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.3",
"product_id": "T032270"
}
},
{
"category": "product_version",
"name": "9.1.3",
"product": {
"name": "Splunk Splunk Enterprise 9.1.3",
"product_id": "T032270-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.1",
"product_id": "T033705"
}
},
{
"category": "product_version",
"name": "9.2.1",
"product": {
"name": "Splunk Splunk Enterprise 9.2.1",
"product_id": "T033705-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.4",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.4",
"product_id": "T033718"
}
},
{
"category": "product_version",
"name": "9.1.4",
"product": {
"name": "Splunk Splunk Enterprise 9.1.4",
"product_id": "T033718-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.9",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.9",
"product_id": "T033720"
}
},
{
"category": "product_version",
"name": "9.0.9",
"product": {
"name": "Splunk Splunk Enterprise 9.0.9",
"product_id": "T033720-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.9"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.3.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.3.1",
"product_id": "T038314"
}
},
{
"category": "product_version",
"name": "9.3.1",
"product": {
"name": "Splunk Splunk Enterprise 9.3.1",
"product_id": "T038314-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.3.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.3",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.3",
"product_id": "T038315"
}
},
{
"category": "product_version",
"name": "9.2.3",
"product": {
"name": "Splunk Splunk Enterprise 9.2.3",
"product_id": "T038315-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.6",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.6",
"product_id": "T038316"
}
},
{
"category": "product_version",
"name": "9.1.6",
"product": {
"name": "Splunk Splunk Enterprise 9.1.6",
"product_id": "T038316-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.6"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22570",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2021-22570"
},
{
"cve": "CVE-2022-25883",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2022-25883"
},
{
"cve": "CVE-2022-31799",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2022-31799"
},
{
"cve": "CVE-2023-24329",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-3446",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-37920",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-3817",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-43804",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44270",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-44270"
},
{
"cve": "CVE-2023-45803",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2023-46213",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-46213"
},
{
"cve": "CVE-2023-46214",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-46214"
}
]
}
WID-SEC-W-2023-2356
Vulnerability from csaf_certbund - Published: 2023-09-14 22:00 - Updated: 2023-09-28 22:00Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Dieser Fehler besteht in den Komponenten des Node.js-Pakets semver und des Moduls word-wrap aufgrund eines Denial-of-Service-Fehlers durch reguläre Ausdrücke. Durch die Bereitstellung speziell gestalteter Regex-Eingaben kann ein entfernter Angreifer diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.
Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Dieser Fehler besteht in den Komponenten des Node.js-Pakets semver und des Moduls word-wrap aufgrund eines Denial-of-Service-Fehlers durch reguläre Ausdrücke. Durch die Bereitstellung speziell gestalteter Regex-Eingaben kann ein entfernter Angreifer diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.
| URL | Category | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2356 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2356.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2356 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2356"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5362 vom 2023-09-28",
"url": "http://linux.oracle.com/errata/ELSA-2023-5362.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5363 vom 2023-09-28",
"url": "http://linux.oracle.com/errata/ELSA-2023-5363.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5379 vom 2023-09-28",
"url": "https://access.redhat.com/errata/RHSA-2023:5379"
},
{
"category": "external",
"summary": "IBM Security Bulletin - 7032220 vom 2023-09-14",
"url": "https://www.ibm.com/support/pages/node/7032220"
}
],
"source_lang": "en-US",
"title": "IBM QRadar SIEM: Mehre Schwachstellen",
"tracking": {
"current_release_date": "2023-09-28T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:58:27.416+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2356",
"initial_release_date": "2023-09-14T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-14T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-09-27T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2023-09-28T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM QRadar SIEM \u003c 2.2.11",
"product": {
"name": "IBM QRadar SIEM \u003c 2.2.11",
"product_id": "T029904",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:2.2.11"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26115",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Dieser Fehler besteht in den Komponenten des Node.js-Pakets semver und des Moduls word-wrap aufgrund eines Denial-of-Service-Fehlers durch regul\u00e4re Ausdr\u00fccke. Durch die Bereitstellung speziell gestalteter Regex-Eingaben kann ein entfernter Angreifer diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T004914"
]
},
"release_date": "2023-09-14T22:00:00.000+00:00",
"title": "CVE-2023-26115"
},
{
"cve": "CVE-2022-25883",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Dieser Fehler besteht in den Komponenten des Node.js-Pakets semver und des Moduls word-wrap aufgrund eines Denial-of-Service-Fehlers durch regul\u00e4re Ausdr\u00fccke. Durch die Bereitstellung speziell gestalteter Regex-Eingaben kann ein entfernter Angreifer diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T004914"
]
},
"release_date": "2023-09-14T22:00:00.000+00:00",
"title": "CVE-2022-25883"
}
]
}
GSD-2022-25883
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-25883",
"id": "GSD-2022-25883"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-25883"
],
"details": "Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r",
"id": "GSD-2022-25883",
"modified": "2023-12-13T01:19:27.040539Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"ID": "CVE-2022-25883",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "semver",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "0",
"version_value": "7.5.2"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credits": [
{
"lang": "en",
"value": "Alessio Della Libera - Snyk Research Team"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r"
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-1333",
"lang": "eng",
"value": "Regular Expression Denial of Service (ReDoS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"refsource": "MISC",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
},
{
"name": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160",
"refsource": "MISC",
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160"
},
{
"name": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138",
"refsource": "MISC",
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138"
},
{
"name": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104",
"refsource": "MISC",
"url": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104"
},
{
"name": "https://github.com/npm/node-semver/pull/564",
"refsource": "MISC",
"url": "https://github.com/npm/node-semver/pull/564"
},
{
"name": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441",
"refsource": "MISC",
"url": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c5.7.2||\u003e=6.0.0 \u003c6.3.1||\u003e=7.0.0 \u003c7.5.2",
"affected_versions": "All versions before 5.7.2, all versions starting from 6.0.0 before 6.3.1, all versions starting from 7.0.0 before 7.5.2",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-1333",
"CWE-937"
],
"date": "2023-07-12",
"description": "Versions of the package semver before 7.5.2 is vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.",
"fixed_versions": [
"5.7.2",
"6.3.1",
"7.5.2"
],
"identifier": "CVE-2022-25883",
"identifiers": [
"CVE-2022-25883"
],
"not_impacted": "All versions starting from 5.7.2 before 6.0.0, all versions starting from 6.3.1 before 7.0.0, all versions starting from 7.5.2",
"package_slug": "npm/semver",
"pubdate": "2023-06-21",
"solution": "Upgrade to versions 5.7.2, 6.3.1, 7.5.2 or above.",
"title": "Inefficient Regular Expression Complexity",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-25883",
"https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441",
"https://github.com/npm/node-semver/blob/main/internal/re.js%23L138",
"https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"https://github.com/npm/node-semver/blob/main/internal/re.js%23L160",
"https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104",
"https://github.com/npm/node-semver/pull/564"
],
"uuid": "ce51134c-efb7-4379-9eec-f3e1b97d84c2"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:npmjs:semver:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "5.7.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:npmjs:semver:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "6.3.1",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:npmjs:semver:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "7.5.2",
"versionStartIncluding": "7.0.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"ID": "CVE-2022-25883"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441",
"refsource": "MISC",
"tags": [
"Patch"
],
"url": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441"
},
{
"name": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138",
"refsource": "MISC",
"tags": [
"Broken Link"
],
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138"
},
{
"name": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"refsource": "MISC",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
},
{
"name": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160",
"refsource": "MISC",
"tags": [
"Broken Link"
],
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160"
},
{
"name": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104",
"refsource": "MISC",
"tags": [
"Broken Link"
],
"url": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104"
},
{
"name": "https://github.com/npm/node-semver/pull/564",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/npm/node-semver/pull/564"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-07-12T00:53Z",
"publishedDate": "2023-06-21T05:15Z"
}
}
}
OPENSUSE-SU-2024:14012-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "system-user-velociraptor-1.0.0-9.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the system-user-velociraptor-1.0.0-9.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14012",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14012-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-25883 page",
"url": "https://www.suse.com/security/cve/CVE-2022-25883/"
}
],
"title": "system-user-velociraptor-1.0.0-9.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14012-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "system-user-velociraptor-1.0.0-9.1.aarch64",
"product": {
"name": "system-user-velociraptor-1.0.0-9.1.aarch64",
"product_id": "system-user-velociraptor-1.0.0-9.1.aarch64"
}
},
{
"category": "product_version",
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.aarch64",
"product": {
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.aarch64",
"product_id": "velociraptor-0.7.0.4.git74.3426c0a-9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "system-user-velociraptor-1.0.0-9.1.ppc64le",
"product": {
"name": "system-user-velociraptor-1.0.0-9.1.ppc64le",
"product_id": "system-user-velociraptor-1.0.0-9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.ppc64le",
"product": {
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.ppc64le",
"product_id": "velociraptor-0.7.0.4.git74.3426c0a-9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "system-user-velociraptor-1.0.0-9.1.s390x",
"product": {
"name": "system-user-velociraptor-1.0.0-9.1.s390x",
"product_id": "system-user-velociraptor-1.0.0-9.1.s390x"
}
},
{
"category": "product_version",
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.s390x",
"product": {
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.s390x",
"product_id": "velociraptor-0.7.0.4.git74.3426c0a-9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "system-user-velociraptor-1.0.0-9.1.x86_64",
"product": {
"name": "system-user-velociraptor-1.0.0-9.1.x86_64",
"product_id": "system-user-velociraptor-1.0.0-9.1.x86_64"
}
},
{
"category": "product_version",
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.x86_64",
"product": {
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.x86_64",
"product_id": "velociraptor-0.7.0.4.git74.3426c0a-9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-velociraptor-1.0.0-9.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.aarch64"
},
"product_reference": "system-user-velociraptor-1.0.0-9.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-velociraptor-1.0.0-9.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.ppc64le"
},
"product_reference": "system-user-velociraptor-1.0.0-9.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-velociraptor-1.0.0-9.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.s390x"
},
"product_reference": "system-user-velociraptor-1.0.0-9.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-velociraptor-1.0.0-9.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.x86_64"
},
"product_reference": "system-user-velociraptor-1.0.0-9.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.aarch64"
},
"product_reference": "velociraptor-0.7.0.4.git74.3426c0a-9.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.ppc64le"
},
"product_reference": "velociraptor-0.7.0.4.git74.3426c0a-9.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.s390x"
},
"product_reference": "velociraptor-0.7.0.4.git74.3426c0a-9.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velociraptor-0.7.0.4.git74.3426c0a-9.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.x86_64"
},
"product_reference": "velociraptor-0.7.0.4.git74.3426c0a-9.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-25883"
}
],
"notes": [
{
"category": "general",
"text": "Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.aarch64",
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.ppc64le",
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.s390x",
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.x86_64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-25883",
"url": "https://www.suse.com/security/cve/CVE-2022-25883"
},
{
"category": "external",
"summary": "SUSE Bug 1212565 for CVE-2022-25883",
"url": "https://bugzilla.suse.com/1212565"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.aarch64",
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.ppc64le",
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.s390x",
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.x86_64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.aarch64",
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.ppc64le",
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.s390x",
"openSUSE Tumbleweed:system-user-velociraptor-1.0.0-9.1.x86_64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git74.3426c0a-9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-25883"
}
]
}
alsa-2023:5363
Vulnerability from osv_almalinux
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18). (BZ#2223313, BZ#2234404)
Security Fix(es):
- nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)
- nodejs-semver: Regular expression denial of service (CVE-2022-25883)
- nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)
- nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:18.17.1-1.module_el9.2.0+36+853e48f5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:18.17.1-1.module_el9.2.0+36+853e48f5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:18.17.1-1.module_el9.2.0+36+853e48f5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-full-i18n"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:18.17.1-1.module_el9.2.0+36+853e48f5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-nodemon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.1-1.module_el9.2.0+36+853e48f5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-packaging"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2021.06-4.module_el9.1.0+13+d9a595ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-packaging-bundler"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2021.06-4.module_el9.1.0+13+d9a595ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "npm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:9.6.7-1.18.17.1.1.module_el9.2.0+36+853e48f5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (18). (BZ#2223313, BZ#2234404)\n\nSecurity Fix(es):\n\n* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)\n* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2023:5363",
"modified": "2023-09-27T16:44:58Z",
"published": "2023-09-26T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:5363"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-32002"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-32006"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-32559"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2216475"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2230948"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2230955"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2230956"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2023-5363.html"
}
],
"related": [
"CVE-2023-32002",
"CVE-2022-25883",
"CVE-2023-32006",
"CVE-2023-32559"
],
"summary": "Important: nodejs:18 security, bug fix, and enhancement update"
}
alsa-2023:5362
Vulnerability from osv_almalinux
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18). (BZ#2234409)
Security Fix(es):
- nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)
- nodejs-semver: Regular expression denial of service (CVE-2022-25883)
- nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)
- nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:18.17.1-1.module_el8.8.0+3613+1ed8c91d"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:18.17.1-1.module_el8.8.0+3613+1ed8c91d"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:18.17.1-1.module_el8.8.0+3613+1ed8c91d"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-full-i18n"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:18.17.1-1.module_el8.8.0+3613+1ed8c91d"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-nodemon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.1-1.module_el8.8.0+3613+1ed8c91d"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2021.06-4.module_el8.7.0+3343+ea2b7901"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging-bundler"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2021.06-4.module_el8.7.0+3343+ea2b7901"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "npm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:9.6.7-1.18.17.1.1.module_el8.8.0+3613+1ed8c91d"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (18). (BZ#2234409)\n\nSecurity Fix(es):\n\n* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)\n* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2023:5362",
"modified": "2023-09-27T15:20:06Z",
"published": "2023-09-26T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:5362"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-32002"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-32006"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-32559"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2216475"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2230948"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2230955"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2230956"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2023-5362.html"
}
],
"related": [
"CVE-2023-32002",
"CVE-2022-25883",
"CVE-2023-32006",
"CVE-2023-32559"
],
"summary": "Important: nodejs:18 security, bug fix, and enhancement update"
}
alsa-2023:5360
Vulnerability from osv_almalinux
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16). (BZ#2233891)
Security Fix(es):
- nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)
- nodejs-semver: Regular expression denial of service (CVE-2022-25883)
- nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)
- nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- nodejs:16/nodejs: nodejs.prov doesn't generate the bundled dependency for modules starting @ like @colors/colors (BZ#2237394)
| URL | Type | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:16.20.2-2.module_el8.8.0+3614+204d6f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:16.20.2-2.module_el8.8.0+3614+204d6f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:16.20.2-2.module_el8.8.0+3614+204d6f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-full-i18n"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:16.20.2-2.module_el8.8.0+3614+204d6f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-nodemon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.1-1.module_el8.8.0+3614+204d6f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "26-1.module_el8.8.0+3614+204d6f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "npm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:8.19.4-1.16.20.2.2.module_el8.8.0+3614+204d6f43"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (16). (BZ#2233891)\n\nSecurity Fix(es):\n\n* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)\n* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:16/nodejs: nodejs.prov doesn\u0027t generate the bundled dependency for modules starting @ like @colors/colors (BZ#2237394)",
"id": "ALSA-2023:5360",
"modified": "2023-09-27T17:32:16Z",
"published": "2023-09-26T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:5360"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-25883"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-32002"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-32006"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-32559"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2216475"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2230948"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2230955"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2230956"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2023-5360.html"
}
],
"related": [
"CVE-2023-32002",
"CVE-2022-25883",
"CVE-2023-32006",
"CVE-2023-32559"
],
"summary": "Important: nodejs:16 security, bug fix, and enhancement update"
}
GHSA-C2QF-RXJJ-QQGW
Vulnerability from github – Published: 2023-06-21 06:30 – Updated: 2026-02-04 20:39Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "semver"
},
"ranges": [
{
"events": [
{
"introduced": "7.0.0"
},
{
"fixed": "7.5.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "semver"
},
"ranges": [
{
"events": [
{
"introduced": "6.0.0"
},
{
"fixed": "6.3.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "semver"
},
"ranges": [
{
"events": [
{
"introduced": "2.0.0-alpha"
},
{
"fixed": "5.7.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2022-25883"
],
"database_specific": {
"cwe_ids": [
"CWE-1333"
],
"github_reviewed": true,
"github_reviewed_at": "2023-06-22T16:52:56Z",
"nvd_published_at": "2023-06-21T05:15:09Z",
"severity": "HIGH"
},
"details": "Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.",
"id": "GHSA-c2qf-rxjj-qqgw",
"modified": "2026-02-04T20:39:09Z",
"published": "2023-06-21T06:30:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/pull/564"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/pull/585"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/pull/593"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920c"
},
{
"type": "PACKAGE",
"url": "https://github.com/npm/node-semver"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js#L138"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js#L160"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138"
},
{
"type": "WEB",
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20241025-0004"
},
{
"type": "WEB",
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "semver vulnerable to Regular Expression Denial of Service"
}
BDU:2023-04976
Vulnerability from fstec - Published: 21.06.2023{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Node.js Foundation, Wazuh, Inc",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 5.7.2 (SemVer), \u043e\u0442 6.0.0 \u0434\u043e 6.3.1 (SemVer), \u043e\u0442 7.0.0 \u0434\u043e 7.5.2 (SemVer), 4.4.5 (Wazuh)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104\nhttps://github.com/npm/node-semver/blob/main/internal/re.js%23L138\nhttps://github.com/npm/node-semver/blob/main/internal/re.js%23L160\nhttps://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441\nhttps://github.com/npm/node-semver/pull/564",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "21.06.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "13.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "29.08.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-04976",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-25883",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "SemVer, Wazuh",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u0430 SemVer \u043f\u0430\u043a\u0435\u0442\u043d\u043e\u0433\u043e \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u0430 NPM, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0441 \u043d\u0435\u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u0432\u044b\u0447\u0438\u0441\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e (CWE-1333)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u0430 SemVer \u043f\u0430\u043a\u0435\u0442\u043d\u043e\u0433\u043e \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u0430 NPM \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e\u0433\u043e \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u044f c \u043d\u0435\u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u0432\u044b\u0447\u0438\u0441\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0417\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u043e\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104\nhttps://github.com/npm/node-semver/blob/main/internal/re.js%23L138\nhttps://github.com/npm/node-semver/blob/main/internal/re.js%23L160\nhttps://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441\nhttps://github.com/npm/node-semver/pull/564\nhttps://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795\nhttps://vuldb.com/ru/?id.232060",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-1333",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
FKIE_CVE-2022-25883
Vulnerability from fkie_nvd - Published: 2023-06-21 05:15 - Updated: 2025-09-23 15:057.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| report@snyk.io | https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104 | Broken Link | |
| report@snyk.io | https://github.com/npm/node-semver/blob/main/internal/re.js%23L138 | Broken Link | |
| report@snyk.io | https://github.com/npm/node-semver/blob/main/internal/re.js%23L160 | Broken Link | |
| report@snyk.io | https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441 | Patch, Third Party Advisory | |
| report@snyk.io | https://github.com/npm/node-semver/pull/564 | Patch, Third Party Advisory | |
| report@snyk.io | https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795 | Exploit, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/npm/node-semver/blob/main/internal/re.js%23L138 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/npm/node-semver/blob/main/internal/re.js%23L160 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/npm/node-semver/pull/564 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20241025-0004/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795 | Exploit, Patch, Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:npmjs:semver:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3DBCA81E-C65B-40E4-8274-83F6B4F07217",
"versionEndExcluding": "5.7.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:npmjs:semver:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "E9EE5F81-D456-411C-8E1F-9D0D555B6FEF",
"versionEndExcluding": "6.3.1",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:npmjs:semver:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "1B472AFF-891B-43BB-8215-DC2CC26C7F2C",
"versionEndExcluding": "7.5.3",
"versionStartIncluding": "7.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.\r\r\r"
}
],
"id": "CVE-2022-25883",
"lastModified": "2025-09-23T15:05:46.017",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-06-21T05:15:09.060",
"references": [
{
"source": "report@snyk.io",
"tags": [
"Broken Link"
],
"url": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104"
},
{
"source": "report@snyk.io",
"tags": [
"Broken Link"
],
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138"
},
{
"source": "report@snyk.io",
"tags": [
"Broken Link"
],
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/npm/node-semver/pull/564"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/npm/node-semver/pull/564"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20241025-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
}
],
"sourceIdentifier": "report@snyk.io",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
],
"source": "report@snyk.io",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
MSRC_CVE-2022-25883
Vulnerability from csaf_microsoft - Published: 2023-06-01 07:00 - Updated: 2026-02-18 02:42| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-25883 Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range when untrusted user data is provided as a range.\n\n\n - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2022-25883.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range when untrusted user data is provided as a range.\n\n\n",
"tracking": {
"current_release_date": "2026-02-18T02:42:00.000Z",
"generator": {
"date": "2026-02-18T12:06:38.375Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-25883",
"initial_release_date": "2023-06-01T07:00:00.000Z",
"revision_history": [
{
"date": "2023-06-26T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-02-18T02:42:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"category": "product_name",
"name": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "azl3 python-tensorboard 2.16.2-6",
"product_id": "2"
}
},
{
"category": "product_name",
"name": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "cbl2 python-tensorboard 2.11.0-3",
"product_id": "1"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.16.2-6 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-tensorboard 2.11.0-3 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-2",
"17086-1"
]
}
],
"notes": [
{
"category": "general",
"text": "snyk",
"title": "Assigning CNA"
}
],
"product_status": {
"known_not_affected": [
"17084-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-25883 Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range when untrusted user data is provided as a range.\n\n\n - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2022-25883.json"
}
],
"title": "Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range when untrusted user data is provided as a range.\n\n\n"
}
]
}
NCSC-2026-0034
Vulnerability from csaf_ncscnl - Published: 2026-01-22 09:03 - Updated: 2026-01-22 09:03Recent updates address critical security vulnerabilities across various software, including Ansible, Node.js, and Golang packages, with significant fixes for ReDoS and sensitive data exposure issues.
Multiple versions of the semver package are vulnerable to Regular Expression Denial of Service (ReDoS) through the new Range function, prompting updates in various products to mitigate this risk.
Multiple Oracle products, including Utilities Application Framework, WebLogic Server, Data Integrator, and Business Intelligence Enterprise Edition, have vulnerabilities allowing unauthenticated denial of service attacks, all with a CVSS score of 7.5.
Recent updates across various AWS packages, Node.js versions, and Python libraries address security vulnerabilities, enhance functionality, and improve performance, while several vulnerability reports highlight critical issues in Oracle Communications, HPE Unified OSS Console, and the cross-spawn package.
CWE-1333 - Inefficient Regular Expression ComplexityApache Tomcat versions 11.0.0-M1 to 11.0.0-M20, 10.1.0-M1 to 10.1.24, and 9.0.13 to 9.0.89 are vulnerable to OutOfMemoryError and Denial of Service due to improper TLS handshake handling.
Multiple vulnerabilities in the path-to-regexp library and related components can lead to Denial of Service (DoS) attacks, particularly affecting Node.js applications and IBM App Connect Enterprise due to backtracking regex issues.
Multiple vulnerabilities across Oracle products and DOMPurify allow for data compromise, denial of service, and XSS attacks, with CVSS scores ranging from 6.3 to 7.3.
Oracle Database Server versions 23.4.0-23.26.0 have a vulnerability in the Fleet Patching and Provisioning component, while Eclipse Jersey versions 2.45, 3.0.16, and 3.1.9 may ignore critical SSL configurations due to a race condition.
The `qs` module's `arrayLimit` option is vulnerable to denial-of-service attacks due to its failure to enforce limits for bracket notation, allowing attackers to exploit memory exhaustion.
Recent vulnerabilities in axios, pgadmin4, and HPE software expose systems to SSRF and credential leakage, particularly through the use of absolute URLs, necessitating updates to mitigate these risks.
Multiple vulnerabilities have been identified in Oracle Financial Services and Retail products, as well as the Spring Framework, allowing unauthorized access to sensitive data and potentially leading to information disclosure.
Multiple denial-of-service vulnerabilities have been identified in Oracle Application Testing Suite, Oracle Agile PLM, Apache Commons FileUpload, and HPE IceWall Identity Manager, with CVSS scores of 7.5 for some products.
Recent updates for Apache Tomcat versions 9, 10, and 11 address the 'MadeYouReset' DoS vulnerability and other issues, with specific versions being susceptible to Denial of Service attacks from malformed client requests.
Multiple vulnerabilities in the Oracle Enterprise Data Quality product and PostgreSQL JDBC Driver allow unauthorized access and insecure authentication, with CVSS scores indicating significant risk.
Apache Tomcat versions 9.0.0.M1 to 9.0.106 have multiple vulnerabilities, including a race condition affecting HTTP/2 connections and denial of service flaws, alongside issues in Oracle Graph Server and HPE Unified OSS Console.
Multiple vulnerabilities affect Oracle Communications Unified Assurance and Oracle Business Intelligence Enterprise Edition, allowing denial of service attacks, while older jackson-core versions are prone to StackoverflowErrors when parsing nested data.
Apache Jackrabbit versions prior to 2.23.2 are vulnerable to blind XXE attacks due to an unsecured document build for loading privileges.
Apache Tika versions 1.13 to 3.2.1 have a critical XXE vulnerability, while Oracle PeopleSoft's OpenSearch component in versions 8.60 to 8.62 is also affected by an easily exploitable vulnerability.
Recent updates to Netty and Oracle Communications products address critical vulnerabilities, including the 'MadeYouReset' attack in HTTP/2, which can lead to denial of service and resource exhaustion.
Apache Tomcat versions 1.0.0-M1 to 11.0.10 are vulnerable to a directory traversal issue that may allow remote code execution if HTTP PUT requests are enabled, alongside other security vulnerabilities in HPE UOCAM.
Apache Struts versions 2.0.0 to 6.7.0 and 7.0.0 to 7.0.3 have a Denial of Service vulnerability due to file leak in multipart request processing, affecting NetApp products.
Apache Tika has multiple critical XML External Entity (XXE) injection vulnerabilities, particularly affecting PDF parsing, allowing remote attackers to exploit crafted documents for sensitive data disclosure and remote code execution.
The document outlines a vulnerability in the `create-hash` package due to inadequate input type checks, leading to potential hash state manipulation and security risks, particularly in the `cipher-base` npm package versions up to 1.0.4.
The document outlines a vulnerability in `sha.js` versions up to 2.4.11 due to insufficient input type checks, leading to potential denial of service and private key extraction risks.
A high severity XXE vulnerability in Crowd Data Center and Server version 7.1.0 has a CVSS score of 7.9, allowing authenticated attackers to access sensitive content without user interaction.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Atlassian heeft kwetsbaarheden verholpen in verschillende producten, welke gebruik maken van Oracle middle-ware producten zoals de Oracle Utilities Application Framework, WebLogic Server, Data Integrator en Business Intelligence Enterprise Edition.",
"title": "Feiten"
},
{
"category": "description",
"text": "Deze kwetsbaarheden stellen ongeauthenticeerde aanvallers in staat om een denial of service (DoS) of om zich toegang te verschaffen tot gevoelige gegevens.\nEen reeks kwetsbaarheden is afkomstig van diverse Oracle-middleware software, welke in Atlassian-producten is verwerkt. Deze kwetsbaarheden zijn verholpen in de Critical Patch Update van januari 2026 van Oracle en verwerkt in de getroffen Atlassian producten.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Atlassian heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Incomplete Cleanup",
"title": "CWE-459"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://confluence.atlassian.com/security/security-bulletin-january-20-2026-1712324819.html"
}
],
"title": "Kwetsbaarheden verholpen in Atlassian producten",
"tracking": {
"current_release_date": "2026-01-22T09:03:42.667958Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0034",
"initial_release_date": "2026-01-22T09:03:42.667958Z",
"revision_history": [
{
"date": "2026-01-22T09:03:42.667958Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Bamboo"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Bitbucket"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Confluence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "Crowd Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "Crucible"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "Fisheye"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "Jira"
}
],
"category": "vendor",
"name": "Atlassian"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3807",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "description",
"text": "Recent updates address critical security vulnerabilities across various software, including Ansible, Node.js, and Golang packages, with significant fixes for ReDoS and sensitive data exposure issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-3807 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-3807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2021-3807"
},
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Multiple versions of the semver package are vulnerable to Regular Expression Denial of Service (ReDoS) through the new Range function, prompting updates in various products to mitigate this risk.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-25883 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-25883.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2022-25883"
},
{
"cve": "CVE-2022-45693",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple Oracle products, including Utilities Application Framework, WebLogic Server, Data Integrator, and Business Intelligence Enterprise Edition, have vulnerabilities allowing unauthenticated denial of service attacks, all with a CVSS score of 7.5.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45693 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-45693.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2022-45693"
},
{
"cve": "CVE-2024-21538",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Recent updates across various AWS packages, Node.js versions, and Python libraries address security vulnerabilities, enhance functionality, and improve performance, while several vulnerability reports highlight critical issues in Oracle Communications, HPE Unified OSS Console, and the cross-spawn package.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21538 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-21538.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2024-21538"
},
{
"cve": "CVE-2024-38286",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Apache Tomcat versions 11.0.0-M1 to 11.0.0-M20, 10.1.0-M1 to 10.1.24, and 9.0.13 to 9.0.89 are vulnerable to OutOfMemoryError and Denial of Service due to improper TLS handshake handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38286 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-38286.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2024-38286"
},
{
"cve": "CVE-2024-45296",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Multiple vulnerabilities in the path-to-regexp library and related components can lead to Denial of Service (DoS) attacks, particularly affecting Node.js applications and IBM App Connect Enterprise due to backtracking regex issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45296 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45296.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2024-45296"
},
{
"cve": "CVE-2024-45801",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle products and DOMPurify allow for data compromise, denial of service, and XSS attacks, with CVSS scores ranging from 6.3 to 7.3.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45801 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2024-45801"
},
{
"cve": "CVE-2025-12383",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Oracle Database Server versions 23.4.0-23.26.0 have a vulnerability in the Fleet Patching and Provisioning component, while Eclipse Jersey versions 2.45, 3.0.16, and 3.1.9 may ignore critical SSL configurations due to a race condition.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-12383 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-12383.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-12383"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "The `qs` module\u0027s `arrayLimit` option is vulnerable to denial-of-service attacks due to its failure to enforce limits for bracket notation, allowing attackers to exploit memory exhaustion.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-15284 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-15284.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-15284"
},
{
"cve": "CVE-2025-27152",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Recent vulnerabilities in axios, pgadmin4, and HPE software expose systems to SSRF and credential leakage, particularly through the use of absolute URLs, necessitating updates to mitigate these risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27152 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27152.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-27152"
},
{
"cve": "CVE-2025-41249",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Financial Services and Retail products, as well as the Spring Framework, allowing unauthorized access to sensitive data and potentially leading to information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-41249 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-41249.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-41249"
},
{
"cve": "CVE-2025-48976",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple denial-of-service vulnerabilities have been identified in Oracle Application Testing Suite, Oracle Agile PLM, Apache Commons FileUpload, and HPE IceWall Identity Manager, with CVSS scores of 7.5 for some products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48976 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Recent updates for Apache Tomcat versions 9, 10, and 11 address the \u0027MadeYouReset\u0027 DoS vulnerability and other issues, with specific versions being susceptible to Denial of Service attacks from malformed client requests.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48989 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49146",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "description",
"text": "Multiple vulnerabilities in the Oracle Enterprise Data Quality product and PostgreSQL JDBC Driver allow unauthorized access and insecure authentication, with CVSS scores indicating significant risk.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49146 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49146.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-49146"
},
{
"cve": "CVE-2025-52434",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Apache Tomcat versions 9.0.0.M1 to 9.0.106 have multiple vulnerabilities, including a race condition affecting HTTP/2 connections and denial of service flaws, alongside issues in Oracle Graph Server and HPE Unified OSS Console.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-52434 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-52434.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-52434"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Communications Unified Assurance and Oracle Business Intelligence Enterprise Edition, allowing denial of service attacks, while older jackson-core versions are prone to StackoverflowErrors when parsing nested data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-52999 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-52999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2025-53689",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "description",
"text": "Apache Jackrabbit versions prior to 2.23.2 are vulnerable to blind XXE attacks due to an unsecured document build for loading privileges.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53689 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53689.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-53689"
},
{
"cve": "CVE-2025-54988",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Tika versions 1.13 to 3.2.1 have a critical XXE vulnerability, while Oracle PeopleSoft\u0027s OpenSearch component in versions 8.60 to 8.62 is also affected by an easily exploitable vulnerability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-54988 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-54988.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-54988"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Recent updates to Netty and Oracle Communications products address critical vulnerabilities, including the \u0027MadeYouReset\u0027 attack in HTTP/2, which can lead to denial of service and resource exhaustion.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55163 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-55752",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Tomcat versions 1.0.0-M1 to 11.0.10 are vulnerable to a directory traversal issue that may allow remote code execution if HTTP PUT requests are enabled, alongside other security vulnerabilities in HPE UOCAM.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55752 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55752.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-55752"
},
{
"cve": "CVE-2025-64775",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "other",
"text": "Incomplete Cleanup",
"title": "CWE-459"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Struts versions 2.0.0 to 6.7.0 and 7.0.0 to 7.0.3 have a Denial of Service vulnerability due to file leak in multipart request processing, affecting NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-64775 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-64775.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-64775"
},
{
"cve": "CVE-2025-66516",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Tika has multiple critical XML External Entity (XXE) injection vulnerabilities, particularly affecting PDF parsing, allowing remote attackers to exploit crafted documents for sensitive data disclosure and remote code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-66516 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-66516.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-66516"
},
{
"cve": "CVE-2025-9287",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "The document outlines a vulnerability in the `create-hash` package due to inadequate input type checks, leading to potential hash state manipulation and security risks, particularly in the `cipher-base` npm package versions up to 1.0.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9287 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9287.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-9287"
},
{
"cve": "CVE-2025-9288",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "The document outlines a vulnerability in `sha.js` versions up to 2.4.11 due to insufficient input type checks, leading to potential denial of service and private key extraction risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9288 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9288.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-9288"
},
{
"cve": "CVE-2026-21569",
"notes": [
{
"category": "description",
"text": "A high severity XXE vulnerability in Crowd Data Center and Server version 7.1.0 has a CVSS score of 7.9, allowing authenticated attackers to access sensitive content without user interaction.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21569 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21569.json"
}
],
"title": "CVE-2026-21569"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.